Last week we talked about email & web browser protections, and how they act like a gated wall, filtering & blocking harmful traffic to your network. But what’s a wall without guards? Without guards, there’s no one to identify if a bad guy’s gotten through, let alone isolate & eliminate them.
The same is true in your information security program. The email & web filters/blocks are walls that keep away much of the harm of the internet, but they’re not perfect (and neither are the people who maintain them).
A good cybersecurity program will have malware defenses that help you identify when a hacker has made it past your defenses; further, they can help you isolate & eliminate that threat.
Check out the rest of the 20 for 2020 video series:
https://www.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-18-1.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-04-14 10:26:002020-06-24 14:16:0520 for 2020: "The Obligatory Car Video"
https://www.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-18.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-04-06 12:00:002020-06-24 14:17:3020 for 2020: "Mind Your Own Business"
https://www.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-17.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-04-03 11:47:002020-06-24 14:18:4820 for 2020: "Awareness Training is Number 17..."
https://www.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-14.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-03-18 10:45:002020-06-24 14:20:0520 for 2020: "Wait, Didn't He Talk About This Already?"
https://www.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-13.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-03-16 10:16:002020-06-24 14:20:2020 for 2020: "Live From New York, it's 20 for 2020!"
https://www.tetradefense.com/wp-content/uploads/2020/04/11C.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-03-03 16:23:002020-06-24 14:21:2720 for 2020: "The Never Ending Struggle"
https://www.tetradefense.com/wp-content/uploads/2020/04/Chap-10.png6751200Marlene Joneshttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngMarlene Jones2020-02-17 17:17:002020-06-24 14:21:5920 for 2020: "Two is Better Than One"
https://www.tetradefense.com/wp-content/uploads/2020/01/4.png6751200Lauren Reidhttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngLauren Reid2020-01-30 08:54:292020-06-24 14:23:5220 for 2020: "No one will draw the lines in the sand for you"
https://www.tetradefense.com/wp-content/uploads/2020/01/2-1.png6751200Lauren Reidhttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngLauren Reid2020-01-20 15:37:282020-06-24 14:24:3520 for 2020: "Know What You Have" (Software Edition)
https://www.tetradefense.com/wp-content/uploads/2020/01/1.png6751200Lauren Reidhttps://www.tetradefense.com/wp-content/uploads/2019/12/Web_Orange_White_sized-300x97.pngLauren Reid2020-01-16 15:45:072020-06-24 14:24:4920 for 2020: "Know What You Have" (Hardware Management Edition)
Last week we talked about email & web browser protections, and how they act like a gated wall, filtering & blocking harmful traffic to your network. But what’s a wall without guards? Without guards, there’s no one to identify if a bad guy’s gotten through, let alone isolate & eliminate them.
The same is true in your information security program. The email & web filters/blocks are walls that keep away much of the harm of the internet, but they’re not perfect (and neither are the people who maintain them).
A good cybersecurity program will have malware defenses that help you identify when a hacker has made it past your defenses; further, they can help you isolate & eliminate that threat.