Use Endian Firewall to protect your entire network including segregated email and web servers
Make all your sites such as email secure, try Let's Encrypt.
The use of all SSL certificates is free, you may donate and support them if you wish to do so.
Take alook at thier site for full details and how to use.
View Fortiguards live threat map and see what is going on in the world, it is quite fascinating.
Web site updated 30/04/2020
Security by design should be on the forefront of your mind when designing or implementing any new system regardless of ow small it is. Design security into all your planning from the start and you will not need to worry about it when it is too late.
You should even think security when installing something as irrelevant (you may think) as a printer. Think before you deploy it into an open plan office, who will print to it, what will they print, who has access to it. You do not want every employee looking at you managers pay slip that HR have printed and forgot to pick up, they might see how little you are payed......
Cyber security refers to preventative methods used to protect information from being stolen, compromised or attacked. It requires an understanding of potential information threats, such as viruses and other malicious code. Cyber security strategies include identity management, risk management, incident management, planning ahead and much more.
Cyber security starts at the perimeter of your buildings grounds and carries on throughout everything within the building and even beyond.
Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store vast amounts of confidential information about you, on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber-attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
During a conference in 2013, nation's top intelligence officials warned that cyber-attacks and digital spying are the top threat to national security, eclipsing terrorism.
The basics are simple, Know what digital data and software you have. Know where it is, who uses it, who has access. Create a digital information asset register, keep records of any changes and audit regularly.
Make clear and precise policies, ensure they are kept up to date. Make sure all the relevant people know about the policy and know the policy. Staff training is a very important but overlooked part of any business security strategy.
Believe it or not, around 86% of all threats to any business are caused by its employees, mishandling data, losing data, incorrectly entering or updating data, leaving data in full view of anyone in the vicinity of their work space. Receiving an email and clicking on a link in the email. So let's get our acts together and train. It is a simple and inexpensive option and can save much hardship later on.
Passwords. Why do we use them. Simple, thet are there to safeguard our information and dat that we store on our networks and computers.
There are other options available to us for security which can be found on the Password Page.
You should make clear and precise policies with regards to your passwords, such as how often they should be changed, the criteria required to make a password that is of any use. i.e. a weak password is just as mush use as not having a password at all.
Set minimum requirements, such as a minimum length of 10 characters, it should contain a mix of numbers lettersand special characters (symbols)
Discover more about passwords here.
The content of my web site is being reviewed and updated, so please keep coming back.
I will be adding new information, examples and maybe even some templates you can use to get your security going.