Cyber Security

Concerned about cyber-security for your small business? You should be. Cyber attacks do not discriminate on the basis of company size or industry, and they can be as formidable as any financial operation or reputation risk a company will face.

Instead of leaving your data, network, and business assets at risk, you can can be protected with cutting-edge technology and human talent, both on the outside, and on the inside. Cyber-security also forms the basis for many compliance related issues such as GDPRm and may even void insurance if not properly exercised. You do have cyber insurance right?

Perimeter Defence

Firewalls

Firewalls

A firewall is a barrier between your business network and the internet, a vital component in your businesses IT infrastructure. Firewalls help mitigate the threats that arise by giving systems, and people, access to the internet.

Your average off-the-self router/firewall is unreliable, has limited functionality and potentially multiple software vulnerabilities. Commodity router/firewall manufacturers don't any incentives in patching software bugs, performance problems or even serious security holes. It's all about money, and there is just no incentive from manufacturers.

Having a managed firewall solution from Sheridan Computers gives you piece of mind that your firewall is being actively monitored 24x7 365 days a year, software patches will be applied as they are made available.

Intrusion Detection Systems

An intrusion detection system (IDS) is an system that monitors the network traffic on your business network for known exploits, threats, and suspicious activity. Upon being triggered by an event, the intrusion detection system will alert network administrators to allow them to respond.

Intrusion Prevention Systems

An intrusion prevention system (IPS) works and hand-in-hand with IDS systems and provides an automated way to block detected threats before they hit your network.

DNS Protection

DNS protection works by attempting to prevent access to malicious external sources such as websites. When visiting a website it's location on the internet has to be looked up to determine where abouts on the internet the site lives, the technology which handles this is known as DNS which translates human readable website addresses to internet addresses. DNS protection systems have black lists of these addresses which can then be blocked at the perimeter level.

In addition to preventing access to malicious external sites, DNS protection can also serve to prevent access to categories of websites such as those serving adult content, social media websites or external email providers.

Endpoint Security

Endpoint security is the second line of defence after perimeter security, and the first line of defence for internal security. Systems should be secure on their own without having to rely on edge devices. While edge devices such as firewalls and IDS/IPS systems will help protect from external threats, they cannot protect you from internal threats, whether they be threats that have breached perimeter defences, or threats arsing from internal bad actors.

Software Updates and Security Patching

First and foremost, the most important part of endpoint security is keeping desktops and servers secure. The simplest, most efficient, and cost-effective way to implement is by keeping servers and desktops up-to-date. For example, operating systems, such as Microsoft Windows, have patches released on a regular basis; in the same respect so do application vendors such as Adobe. It is important to be aware of patches as they are released and implement them as soon as possible for the best line of defence.

Anti-Virus Software

If a malicious piece of software manages to find its way on to your desktops, or your servers, serious consequences can arise. The nature of the threat can vary in many ways such as destruction of data, a common attack vector being ransomware. But what if you're data is exposed? This could have serious legal or professional implications.

The threat of ransomware is getting worse, rather than simply asking for money in return for your data (which can be an inconvenience but easily resolved in most cases via your backup and disaster recovery plan, bad actors are now requesting money in exchange for not releasing your data to the general public, which could have serious financial implications, the least of which being your competitors having your information.

Certain operating systems such as Windows 10 have anti-virus built in, which is comparable or even better than that of many third-party anti-virus solutions. The anti-virus software built in to Windows 10, Windows Defender, is an excellent product, even more so with optional add-ons such as Advanced Threat Protection.

Wait what? That's right, Windows Defender is an awesome product but you have to manage it yourself and keep on top of it yourself, which in a business environment with many machines can be a headache many business owners just don't want, or have the technical expertise to deal with. This is where managed anti-virus solutions such as those provided by our Managed IT Services come in to play. If your systems are protected by managed anti-virus software from Sheridan Computers our teams are notified of any threats and able to respond and ensure any threats detected are removed, much of the time without any knowledge or interaction from users.

Web Protection

Web protection works in addition to anti-virus software attempting to block access to external sources before threats can be downloaded to your systems, similar to DNS protection mentioned above but on an endpoint level, and just as important. Web protection also scratches other itches such as content blocking (preventing access to adult or inappropriate websites), a service also provided by our managed service offerings.