When it comes to cyber security, there can be a bewildering array of options for security software and hardware, to understand. However none of them on their own offer a complete solution for businesses in todays online world.
Integrity IT combine multiple layers of defence, each with its own controls and policies. Allowing authorised users their required access whist preventing malicious attacks on your network.
A good starting point for most SME’s is the Cyber Essentials scheme which helps businesses implement good practices which help towards GDPR compliance as well as overall cyber security.
Other cyber security solutions include:
Sophos XG next-gen firewalls not only control the flow of traffic in and out of your network, they include additional functions such as intrusion prevention, website content filtering and can even protect against as-yet unknown threats by identifying suspicious files and opening them in a virtual environment outside of your network, a technique known as ‘sandboxing’.
We can also create Data Loss Prevention (DLP) policies to prevent sensitive information such as bank details or personally identifiable information from being emailed out.
By combining Sophos Endpoint Protection with XG Firewall, businesses can take advantage of the Sophos Security Heartbeat. This centralised security method monitors all computers and servers on the network and in the event of an infection can isolate an infected PC before it has a chance to infect other devices on the network.
Sophos InterceptX is dedicated Anti-Ransomware software which sits alongside your Anti-Virus Software. InterceptX can detect when files are systematically being encrypted maliciously, it can then stop the attack and roll back any damaged files, dramatically reducing the impact of ransomware.
Hard drive encryption for laptops, mobiles and USB drives is also an important step, in order to prevent a data breach if a portable device is lost or stolen.
Two factor authentication, also known as multi-factor authentication (2FA or MFA for short) is a simple method of confirming a users identity. For secure VPN access a user is required to provide not only a username and password but also a single use code which is sent to a secure mobile app.
Not only does it prove human interaction, it allows businesses to quickly revoke remote access if required.