Today we go back to the “basis” and discuss protecting the organization’s assets in a three-part series.
You want to keep reading, especially if your organization is 100% cloud-based.
Part 1: Internet Access.
When you sign up for Internet service, you typically are provided a device (cable modem or some router) by the Internet Service Provider (ISP). The primary purpose of this device is to make it easy for you to connect to the Internet. Although they provide some security features, they are not designed to protect against modern cyber threats. The same applies to an office where the landlord provided an Internet connection.
Recommendation: A dedicated security device, typically referred to as a hardware firewall, is strongly recommended between the Internet connection and your network. This physical device is designed to detect threats from external and internal sources.
In the real world, this device can be compared to a highly trained security guard watching the only access point 24/7 into a building. Anyone that comes in or out the building is checked to ensure they are allowed to enter or leave.
Benefit: Deploying this methodology help protect your business from most cyber threats unleashed daily.
Have questions? Schedule a 20 minute call https://tiny.proactivediscovery.com/book-cyber-call