Cyber Security 101

Lesson 9

Knowing what GOOD technology for cyber security looks like

Welcome to Lesson 9 in cyber security

In Lesson 8 you learnt how to handle a cyber attack. This lesson is about good cyber technology, and what your strategy should include.

In this lesson we’ll examine how good tech for cyber security needs to look.

A cyber security strategy needs to include: 

  1. staff training, 
  2. processes that protect the business’s systems, networks, software, data and devices, and 
  3. technology to reduce cyber risk.

But what does good technology look like?

It can be difficult to know which tool, or tools, to use to get protection for all your computers and devices. Think about the aspects of cyber security that need attention: passwords, firewalls, antivirus and anti-malware protection, and vulnerability scanning of all employee’s devices.

In the past, you could get away with a backup schedule and antivirus protection for your cyber security. Each of those tools could come from different providers, and you’d be pretty well protected. These days, that isn’t enough: you need more. Cyber criminals have become ruthless professionals and have found their way into systems that don’t have stringent cyber security tools in place.

Because there are so many different aspects to cyber security technology now, there are likely to be gaps in your protection if, for example, you use one provider for backup, another for ransomware protection and yet another for antivirus.

These days, cyber security providers see the advantage in delivering a single cyber security solution, with all necessary products bundled into one. This way they cover all security bases and leave no gaps for cyber criminals to find.

These are some of the questions you should ask of the product you use:

Does it classify 100% of your processes?

Does it include ransomware protection?

Does it monitor all endpoint activity?

Does it provide a security audit and real-time alerts by email?

Does it continuously monitor all your applications?

Is it easy to install and manage and is protection immediate?

Does it offer patch management?

Does it give you a clear picture of your vulnerabilities?

If the product you use does all these things then you have a good one. If it doesn’t, it’s time to look for another.

Share this cyber security course

Share on facebook
Share on linkedin
Share on twitter
Share on whatsapp
Share on email

In Bonus Lesson 10 we’ll give you a video demonstration of what good endpoint protection looks like.

Note: This content is general advice and should not be construed as paid-for cyber security advice and instruction.

We are taking all necessary precautions around the COVID-19 situation. Our offices are closed and our team members have each been set up to work remotely in self-isolation at home. As far as possible IronTree will maintain business as usual. All our resources such as server platforms, transactional capacity, telephony and electronic communications, including video meeting facilities, have been configured in the cloud and are 100% operational. Please feel free to contact us if you require our assistance. Stay safe!
One of our team members will be happy to help answer any questions you have!
Just click the chat icon in the right-hand corner.