(615) 443-4842

Have you ever tried to unbake a cake? How about unscramble eggs?

The time to add ingredients is before you start cooking and in the right order. Without the correct steps, what you end up with may look okay…but will not hold up to a taste test.

The same goes for your business and personal computer and network protection. The time to protect your business is before you’ve been exposed to malware and cyberthreats. Once the bad guys get in it’s too late.

The security provider and those that have been breached agree on one thing: It is much less expensive to protect a system than to recover from a cyberattack.

What is adequate protection? It means different things to different people. My thought is adequate protection is the best you can afford for the type of business you are protecting.

If you are not willing to protect your business and your clients now, how are you going to stay in business when you get breached or another type of disaster happens?

Did you know that if you don’t take active steps to protect your business and client’s data your insurance may not pay for a data breach?

While enterprise protection may not be feasible for small to medium sized businesses, you still need some type of protection because today’s attackers are targeting them. Hackers are crushing under-protected companies with ransomware, persistent malware and other threats.

Protection could include:

  1. Hardened modems, firewalls, routers and switches
  2. Reactive – the antivirus of old isn’t up to the task of today’s threats by itself.
  3. The big names in antivirus, along with new companies, are changing their tactics to next-generation antivirus (NGAV). This type of protection works by using cloud-based artificial intelligence, behavioral detection, machine learning and other emerging techniques to try to stop never-before-seen threats that may evolve quickly to circumvent cybersecurity measures.
  4. Proactive security such as Huntress, is a multi-layer approach using machine learning, AI, along with white hat hackers that can isolate a computer and help in removing threat.s that have a persistent foothold

The cost of protection varies. Some experts suggest you should invest 10% of your IT budget into protecting your computer systems. And all agree the approach should be multi-layered.

Here is an example of what I use for a multi-layered approach:

  • Layer 1 – Webroot Endpoint Security & Webroot DNS
  • Layer 2 – Huntress in case something gets by the first option or is a persistent threat that is hidden from detection.
  • Layer 3 – Conceal Browse to protect you from malicious links.
The cost of not protecting your business:
  1. The loss of trust with your clients when you have to notify that their data was potentially stolen.
  2. The cost of cleaning up the breach and removing any remaining threats before reopening your business.
  3. The cost of having to secure everything correctly.
  4. The cost of thoughts always in the back of your mind asking the questions, “Was something missed?”; ” Will it happen again?”; ” Was everything done to protect my clients this time?”

Which one do you choose?

We live in a world of hackers and other bad actors. So don’t take any chances with your data or your business.

If you’re interested in learning more, send an email to jnay@jimnay.com. You can also call or text us at 615-443-4842.

All the best,
Jim Nay

HTML Snippets Powered By : XYZScripts.com