© Anchor Technology, Inc. 2019
A basic firewall between your network and the
Internet is the old normal. Now a security
appliance that has firewall and many other
features to protect your network are affordable
and cost justified.
Security Appliances offer a portfolio of
security services, from:
•
Traditional intrusion prevention
•
Gateway anti virus
•
Application control
•
Spam prevention
•
URL filtering
•
Remote access and remote office
connectivity
Optional advanced services for protecting
against evolving:
•
Malware
•
Ransomware
•
Data Breaches
The old anti virus products have been
replaced with Advanced Security Products
designed to defend against:
•
Ransomware
•
Emerging Threats
•
Viruses
•
Trojans
•
Rootkits
•
Exploits
•
Spyware
The common way anti virus and threat
detections work is comparing files to a
database of known threats as well as other
ways of detection. New viruses and malware
are being developed daily and there is short
window time they are not yet in databases.
They are sometimes called zero day threats.
The bad guys are working 24/7 and you are
never 100% protected so a good backup
system is essential.
Employee training on “good practices” such as
not opening certain kinds of email attachments
and visiting malicious websites is important as
well.
Disclaimer:
We recommend various security appliances and anti
virus or security products which are very highly
rated in their effectiveness. Be advised that no
system is 100% secure but its a good practice to
make every attempt to secure your network with
such products. Our company and the
manufacturers of network security and anti-virus
accept no responsibly for loss of data or corruption
of files.
No one system is 100% effective but the industry
recommends:
•
Network/Internet security protection
•
Device based (PC Server etc.) anti virus software
•
Employee training on how to avoid threats
•
File by file and image backup’s of PC’s and
Servers
Security Appliances/Firewalls
Checklist of protection:
•
Unsecured Wireless Networks
•
Backup/Disaster Recovery plans
•
Physical Building Security
•
Employee vandalism
•
Review of threat history logs and
monitoring
•
Verification of successful backups
•
Windows/software updates current
•
Thumb drive/ removable media control
•
Strong Password Management
Threats
Wireless risks
Network Security