If you’re an older (I preferred experienced) technician like myself, you’ll remember the days of John Wayne saying, “Circle up the wagons boys, it’s going to be a long night.” Well, the same can be said today regarding how we defend ourselves from attacks while navigating the perils of the Cyber frontier. In the old westerns, circling the wagons was a way of setting a defense barrier when a wagon train stopped for the evening. The circle was to prevent many intruders from rushing the camp overnight. It had its faults but served a purpose and saved lives. In the world of technology, firewalls, antivirus, security parameters, etc. take the place of wagons in this analogy. The difference nowadays is the varying layers of defense/circles that can be put in place against the dangers of the new frontier. The only real question is how many circles do you need to keep your wagon train protected? In today’s world, a minimum of at least four should be in place:
Circle 1: Antivirus
This is your base and first circle of protection. Today’s antivirus keeps computers and data safe from Malware, viruses and cyber-attacks.
Circle 2: Spam Protection
Secure your email. Most attacks originate in your email. A service designed to reduce spam and your exposure to attacks on you via email is a critical addition to your train’s security.
Circle 3: Backups
Backup. Backup and – oh yeah – backup. Normally the only way to recover from a cyber-attack such as ransomware is to restore from a backup. If you only have one method for backup, you may need a rethink. How sure can you be that your ONE backup solution is reliable? Your backups should be maintained locally, monthly and, most importantly, offsite.
Circle 4: Firewalls
Yes, we all have heard the term firewall and believe that we have one in place somewhere. However, the real question is – is your firewall proactively protecting you? If you haven’t looked at your firewall solution lately, the options for proactive protection are improving daily. If the bad guys on the cyber frontier are looking for new holes in your wagon circle, shouldn’t you be proactively patching those holes?
There ARE several other circles of security to be considered, but these are what I believe are the four core items that should be addressed immediately when looking at your business’s security. If you already have these four items in place, when was the last time you verified them? The old saying of “trust but verify” should be implemented when dealing with your network’s security. For more information, contact Rick Catron at 586.486.3915 or visit Auxiom’s website.