May 16, 2022 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter “zero trust”, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization. Why Zero Trust is Important Now In recent decades–especially the last two years since work went remote–more users are connected to business networks and other Cloud services. With the “perimeter” now outside the traditional office, more care is necessary to grant access only to legitimate users. With more devices connected, data and applications are available to more people. In the zero-trust model, no individual is assumed to be trustworthy simply by being part of the organization. And that begs the question of who is a legitimate user. Zero Trust Defined Zero-trust is a cybersecurity posture that assumes that any user seeking to access the system could be a bad actor. Organizations using a zero-trust architecture have set up various criteria to determine that the entity (a device or a person) seeking access is entitled to it. Not only that, but depending on the location of the device and the role of the person using it, access can be limited to the computing resources needed for that person’s function. A common practice used in zero-trust is multi-factor authentication. After giving their password, a user performs an additional step, like submitting...
May 6, 2022 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
Threats are everywhere, and not expected to decrease. All over the world, individual and state actors seek to attack businesses of every size–malware and ransomware via phishing emails, denial of service attacks, and other intrusions. Read on to learn how you can keep your cyber shield up and your business protected. CISA and Your Company The Cybersecurity and Infrastructure Security Agency (CISA), a part of the United States’ Department of Homeland Security, leads the nation’s work in protecting the cybersecurity ecosystem, and helps protect critical resources undergirding American society. It helps organizations “prepare for, respond to, and mitigate the impact of cyberattacks.” Even in times of relative peace, bad actors still attempt to breach the cyber defenses of businesses of all sizes. Small and medium-size businesses are often particularly targeted, since attackers know they may not have the same level of security as a government agency or large corporation. In addition, they also target managed service providers, to whom small to medium-size businesses outsource their infrastructure. However, when MSPs and SMB’s work together, and enlist the help of the CISA, they can put up a strong shield against cyberattack. Partner With Your Technology Advisor To lower risk, consider implementing robust network monitoring and work with clients to ensure that the infrastructure is monitored and well-maintained. While you can play a role by assessing your own risks you can also work with your technology advisor to mitigate those risks. Require multi-factor authentication for everyone accessing the network, update software and operating systems, and perform continuous backup of critical data and systems, among other practices. Remember, if...