PROTECTION

An Overview

This toolkit will provide your small business with knowledge of common security protocols that can be used to secure data by applying a multi-layer security solution. The point of this layered security is to stop cyberattacks on different levels, making it difficult for cybercriminals to infiltrate the system and extract confidential information. Below are 3 steps on how to do this. If you need more information on the topics displayed below, make sure to check out the full article for a deeper understanding.

STEP ONE

There are many solutions that will help keep you safe as you traverse the web.
Here are 9 tips to get you going.

one-circle

VPN

A virtual private network (VPN) masks your network information, making it extremely difficult for cybercriminals to pinpoint your exact data. This will allow your employees to anonymize internet traffic. Learn more here.

two-circle

Anti-Virus

An anti-virus is a computer program used to detect, prevent and remove viruses/malware from your computer. Runs a scheduled scan that detects anomalies within your system. Learn more here.

three-circle

Anti-Spam

Detects and blocks unsolicited bulk emails that may contain malware, phishing frauds, spyware and more.

four-circle

Anti-Spyware

This blocks spyware attempts, which is a software that monitors your computer activity and sends the information to cybercriminals.

five-circle

Anti-Phishing

Defends and detects against emails from unsolicited senders by filtering your emails. Learn more about identifying phishing tactics here. Take the phishing quiz to test your understanding here.

six-circle

Proxy

Acts as a firewall and web-filter by accessing the internet through an intermediary server. This hides your location and IP address from cybercriminals.

seven-circle

Ad blockers

A software or web browser plugin that can be used to alter or block online advertising. Eliminates pop-ups and side-page propaganda.

eight-circle

Firewall

Network security that monitors incoming and outgoing data based on a set of security rules. This prevents and alerts unauthorized access to networks.

nine-circle

Guest Network

A public network that is isolated and separate from your home network. It is used for guests who want internet access. Learn how to set one up here.

STEP TWO

Secure data on online accounts using these 7 tips.

one-circle

2-step verification

Creates an extra layer of security by requiring a randomly generated password sent to the account owners selected device. Learn more here 2-Step Verification.

two-circle

Strong Password

Strong password practices combined with two-factor authentication. Learn more here.

three-circle

Automatic Updates

Having automatic updates enabled will keep your system up to date with the latest security updates that detects and protects against the latest threats.

four-circle

Anti-Malware

Completes the functions of antivirus. To learn more about the difference between anti-virus and anti-malware, make sure to check out our article here.

five-circle

Encrypted Messaging Apps

This will allow your employees to send you essential information over text while making it hard for cybercriminals to read.

six-circle

Encrypted Emails

If your business has to send confidential information make sure to encrypt your email so no one can decode your email exchanges

seven-circle

Cloud Storage

This can help your small business backup of your (previously encrypted) data. Cloud storage allows you to save a backup without the need of a physical storage. The data gets saved online in your personal storage linked to the account.

STEP THREE

Protect data stored on local drives with these 3 tips.

one-circle

Backup Data

Backup data externally, in the cloud, flash drives, etc. This allows you to revert back to original save or recover files that were previously lost. Learn more about how to backup your data here.

two-circle

Encryption + Strong Passwords

Encryption in combination with strong passwords, because no matter how good your encryption program is, if you don’t have a good password to compliment the program then the existing condition wont change.

three-circle

Antivirus

Yes, this was mentioned before, but it can check your files if malware is present in operating system. Learn more about different kinds of malware here.

More Toolkits

Identifying Toolkit

Responding Toolkit

Phishing Toolkit