Six Technologies That Will Make Your Business Safer

By on Nov 2, 2013 in Blog

There are many technologies out there that help businesses stay safe and secure from most threats. As we’ve said before time and time again – the best defense against suffering a security breach is to make yourself as difficult a target as possible.

Always remember that cybercriminals in general tend to look for the easy opportunities to exploit, rather than spend extra time and effort trying to break into a relatively secure system. Sadly the major reason for this is because there will always be plenty of “low hanging fruit” out there to target – which is why it is so critically important to make sure you are not one of those.

Here is a list of six technologies that will go a long way to help secure your business. Best of all, these are not particular difficult or expensive to implement – but the savings in terms of worry, headache, and heartbreak are truly priceless.

1. Hosted Email Security

Hosted Email Security is a cloud based solution that requires almost no intervention or maintenance on your part. You simply buy the service and it keeps on running in the background.

What this service provides is real-time threat protection against almost all email-based threats – including spam, phishing, virus, and malware emails – while allowing through “good emails”. Some providers will also include directory harvest (DHA) protection, Denial of Service (DoS) protection, and other advanced techniques to help identify new threats.

The service provider will take care of all updates and maintenance on your behalf, so this takes away a major effort of keeping systems secure – and email analysis will also take place on the provider’s own servers, so there are some bandwidth savings to be had as well.

You can find Hosted Email Security services through your favorite search engine. Most popular computer security brands that you’re familiar with will usually provide such as service.

2. Web / URL Filtering

Web / URL Filtering is similar to Hosted Email Security, except that this specializes in protecting you from web-based attacks – for example websites containing malicious code and other malware. This is also a passive service that will run in the background while you go about your business, while taking care of the security updating and maintenance on your behalf.

Certain business owners may also appreciate the added functionality provided by Web / URL Filtering services – such as blocking specific websites, website categories, and file types from being accessed by business computers (these rules can also be applied based on time of day and bandwidth consumption). You can also usually look at some cool statistics about your web usage should that interest you.

Most popular computer security brands that you’re familiar with will usually provide such as service, and you can certainly also find them through your favorite search engines.

3. Reputation-based Antivirus

This is an emerging trend with antivirus providers – where instead of only looking for traditional virus / malware signatures to identify threats, there is increased focus on where the virus / malware comes from in order to identify new threats more quickly.

As the namesake indicates, if new software is released by a source known to produce malware – then there is a good chance this new software is also malware – even if it uses none of the known indicators. The downside of this form of protection is that it can produce a lot of false positives, however this is a particular technology that will improve over time.

If you are using an antivirus solution then you should already have this option available. If not then you should immediately update your antivirus software so you can gain this ability.

4. Automated Patch and Configuration Manager

This type of software is becoming very popular and for good reason, though you do not necessarily need separate software to enable this feature. The advantage of buying software to take care of all your updating needs however, is that it you don’t need to individually configure automatic updates for all the software you use in your business (assuming this feature is available).

Patching and updating your software is extremely important for maintaining security integrity, because new vulnerabilities and exploits are found everyday that can compromise your business – which is precisely why software companies are releasing updates and patches so often.

Rather than going to all this effort yourself, you can (and should) automate the whole process and spend more time take care of business.

5. Web Application Vulnerability Scanner

Such software is designed to look for vulnerabilities in your website and web applications. Not all businesses will have a need for such a tool, but if your business depends on your website and / or having online access (e.g. shopping carts, login pages, dynamic content etc.) – then such a tool can be invaluable to helping you identify and lock down vulnerabilities before they can become an issue.

This is because web application attacks are a notorious weakness in the security integrity of many businesses, which is because this avenue of attack is usually unexpected – ergo a weak point in your security defenses.

What this software does is simulate attacks against your web services to see if anything gets through. If it does, then you have identified a weakness that can be exploited – and as they say, knowledge is power. A variation of this software is commonly used by cybercriminals to gain access to computer systems, which is precisely why running such a scan yourself right from the beginning can be tremendously valuable.

6. Full / Whole Disk Encryption

Disk encryption is a technology that protects lost laptops and devices from prying eyes, by converting your information into unreadable code that can only be accessed with the correct key.

There are many encryption solutions available, and not all of these technologies are created equal – and can be vulnerable to certain advanced forms of attack. However for the majority of business cases in the real world (i.e. you are not an international spy selling secret technology to the highest bidder), a reputable provider can supply you with all the encryption tools you need.

Thank you for reading and stay safe.

Post a Reply