PCS Blog

Are Your Bases Covered?


We get asked, on a fairly regular basis, “What is the best way to protect my business from the various threats in cyberspace?” The answer really sounds more complex than it actually is. To protect your business in the threat landscape of today, you need a multi-layered approach to security.

Those of us who work in the Technology industry realize that, given even the slightest opportunity and a little time, those who would do us harm can perform their evil deeds with catastrophic results. It seems like every other day there is some sort of headline about a security compromise or client data that has been illegally accessed. Those headlines do not provide a fair representation of the damage caused to small businesses or individuals. In some cases, while the breach may be more significant for larger companies, the little guys often suffer the most when trying to recover from a malicious attack, where corporate data has been stolen or encrypted. In fact, statistics indicate that more than 75% of small businesses that were breached and lost their data were unable to recover.

So what do we do about this? We make it difficult to be breached and have a solid recovery plan. The multi-layered security plan is designed to protect your business from the outside in. We want to implement a perimeter defense. The perimeter defense is typically used to prevent malicious hackers or software (malware, spyware, and virus) from being able to get into our environment. We use a hosted anti-spam service to block malicious code attached to inbound emails before it gets inside our network. We employ properly configured firewalls or security appliances to screen inbound and outbound traffic and block intruders as well as malicious code. So, with perimeter defense we are digging a moat around our business, but what if something were to somehow, against all odds, get past the perimeter defense?  This is where endpoint protection comes in. To protect our endpoints we need to employ an industry leading endpoint protection solution or Anti-virus. The Anti-virus should be Zero-Day (meaning that it does not require definition updates to be effective) and able to block things based on behavior in addition to a living internet-based white/black list service. If the endpoint protection is able to block things based on behavior and doesn’t require definition updates to be effective, then it is much more effective at threat blocking.

Last but not least, after we have shielded the perimeter of our business and protected the endpoints within, we need to implement a security awareness and training program for our employees. In many cases of modern day hacking, exploits, data hijacking and ransomware, the malicious access or virus is activated or allowed by business employees who are unaware and simply have no idea that they are putting themselves and their company at risk. The moat around the castle and the bars on the windows and doors do no good if the gates are left open, by the people inside.

If you are concerned about data security for your business, contact the IT consultants at PCS today. 

What Do PCS Consultants Focus On?
Our IT consultants work tirelessly to ensure the productivity and efficiency of your team and business. We know better than anyone that IT downtime can mean loss of productivity for your employees, loss of customers who have high expectations for their online experience, and ultimately missed opportunities for your business to grow. That means that the PCS Knoxville Area IT consultants are always thinking ahead strategically to ensure that your IT needs are met regardless of unexpected issues that may arise. A good IT consultant is always anticipating problems and has a plan that can be put into action the instant it a problem is detected. The best IT consultants in Knoxville, Tennessee are part of the PCS team - visit our contact page to reach out and get more information.

Interactive Touch Technology in the Classroom
WPA3: The New Security Standard and What to Expect