Let’s face it, unless you are living on your own personal island with no access to media, you have seen how companies are being hit with new forms of Ransomware. Or, there has been another data breach and some company is now doling out one year subscriptions for credit monitoring. For each of these stories in the news, there are thousands more that are hitting other companies. These companies are small and go unnoticed by the media, or the incident is never reported. In today’s environment, “it’s not if, it’s when.” Small to medium sized businesses are just as likely to be targets of attacks as large corporations. There is no shortage of hackers that would be more than happy to make your business their next victim.
So, what if you need to protect your data?
If you’re a small to medium sized business (SMB), there are steps you can take to greatly reduce your risk of becoming a victim of hackers and malware. Most companies know they need a firewall between your businesses network and the Internet. While this does reduce the threat, it only provides partial protection against today’s more advanced attacks. To truly reduce the risk of attack, your business requires several layers of security. As a managed services provider, we are tasked with helping to minimize the risk within our clients’ IT environments and have found that a layered approach, involving various solutions, provides some of the best risk aversion available.
ProTech’s SMB Security Stack works to prevent malicious attacks for our clients. Below is a snapshot of the various layers and the actions they perform to keep your business safe.
Learn About Our Security Stack
Cloud-Based Domain Filtering
At the network level, we introduce a cloud-hosted solution that continuously tracks known malicious websites and Internet hosts. We pass all Internet traffic through this layer to block access to malicious sites, thus reducing the ability of the user to access potential malware. Additionally, the effectiveness of malware packages that “phone home” before committing atrocities upon your systems is greatly reduced.
ProTech utilizes a security appliance that provides standard firewall features, intrusion detection and prevention mechanisms, network edge virus and malware detection, and content filtering. While providing the usual firewall features, the addition of virus and malware content searches at the edge of the network adds a second layer of protection against threats. By introducing content filtering at this layer, we reduce the ability for users to access the types of sites that are often the source of malware.
Email Filtering – Inbound and Outbound
More and more of the Ransomware and malware that hits companies today is arriving through email. With the advent of Phishing and now Spear-Phishing (the act of explicitly targeting key individuals within an organization), automated systems often cannot detect that the email content being delivered is not valid. By implementing a reliable email filtering solution, ProTech is able to drastically reduce the number of emails carrying malware payloads and reduce emails utilizing commonly know Phishing attack styles. The outbound filtering ensures that. should a user unknowingly infect their device, the ability for the infection to spread to others, via the email systems, is minimized. It also prevents data loss and provides SPAM filtering.
Everyone knows they need antivirus on their computer. This additional layer helps to stop malware that somehow makes it through the other layers or is introduced through an external device, such as a USB or CD. But, endpoint protection is only as effective as its updates. In order to ensure that the endpoint protection software stays up to date, ProTech utilizes cloud-hosted management consoles which allow our staff to monitor the definition updates to our clients' endpoints.
One of the most overlooked items in the SMB market is operating system patch management. Ensuring that servers and workstations have the latest security and critical patches applied is crucial. ProTech provides ongoing monitoring of systems patching to make sure that machines are updated in a timely manner, which can be the difference between being secured and attacked.
Business Continuity and Disaster Recovery (BCDR)
Occasionally overlooked as a component within a security stack, the BCDR layer sits quietly saving and storing data. A BCDR appliance allows allows your business to not only recover specific files in the event of damage due to a security incident, but also the ability to virtualize a protected server from one of many snapshot points over time. As further protection, the solution we have chosen moves all data securely offsite into bi-coastal data centers. So, even if your business is attacked, your data is secure.
Security Awareness Training
New social engineering schemes aim to introduce malware into networks by tricking users into installing software or opening payloads within attachments. ProTech now provides security awareness training for our clients’ user base to enable them to identify threats. Even though this is the final layer in our security stack, it has proven to be one of the most beneficial in thwarting Ransomware style attacks.
Each of the layers in our security stack provides great protection for specific things, and in some cases, layers overlap each other in function. However, by building our security stack in this layered approach, we have found success in minimizing the risk of data loss and downtime for our clients.
If you’re ready to secure your data, contact ProTech to discuss our Security Stack and how it can benefit your business.
Learn About Our Security Stack