PROTECTION

An Overview

This toolkit will provide your small business with knowledge of common security protocols that can be used to secure data by applying a multi-layer security solution. The point of this layered security is to stop cyber-attacks on different levels, as a result, making it difficult for cybercriminals to reach the core of the system and valuable data. The followings are 3 steps of how to do this. If you need more information on the topics displayed below, make sure to check out the full article for a deeper understanding.

STEP ONE

Traffic Filtering Subtitle creates a barrier between you and the web.
Here are 9 tips to get you going

one-circle

VPN

This will allow your employees to anonymize internet traffic.

two-circle

Firewall

This prevents unauthorized access to networks.

three-circle

Anti-Spam

This block emails that can contain malware.

four-circle

Anti-Spyware

This blocks spyware attempts, which aim to monitor your online activity and send the information to cybercriminals.

five-circle

Anti-Phishing

Learn more about phishing tactics used today with our social engineering quiz and video.

six-circle

Proxy

A proxy lets you use a different IP address identity. The proxy ultimately masks your real IP address.

seven-circle

Add blockers

This helps eliminate the threat of advertising.

eight-circle

HTTPS

makes sure that the data you send and receive over the web is always encrypted

nine-circle

Guest Network

Make sure to setup a guest network

STEP TWO

Secure the data on online accounts using these 7 tips

one-circle

Antivirus

Keep you safe against attacks that aim to compromise your software and applications

two-circle

Strong Password

Strong password practices combined with two-factor authentication

three-circle

Automatic Updates

Software up to date and patching those inevitable security holes

four-circle

Anti-Malware

Completes the functions of antivirus. To learn more about the difference between anti-virus and anti-malware, make sure to check out our article.

five-circle

Encrypted Messaging Apps

This will allow your employees to send you essential information over text while making it hard for cybercriminals to read.

six-circle

Encrypted Emails

If your business has to send confidential information make sure to encrypt your email so no one can decode your email exchanges

seven-circle

Cloud Storage

This can help your small business backup of your (previously encrypted) data.

STEP THREE

Protecting your data stored on local drives with these 3 tips

one-circle

Backup Data

Backup data externally, in the cloud, flash drives, etc.

two-circle

Encryption + Strong Passwords

Encryption in combination with strong passwords, because no matter how good your encryption program is, it still needs a very good password to make it hard to crack.

three-circle

Antivirus

Yes, this was mentioned before, but it can check your files if malware is present in operating system.

More Toolkits

Identifying Toolkit

Protection Toolkit

Responding Toolkit

Phishing Toolkit