Table of Contents
What is a small business, and what should it do about cybersecurity?
This is the first of a series of planned posts designed to help the owner(s) of a small business make decisions on what to do about cybersecurity in their business. While I have been supporting the IT needs of small businesses as a profession for the last 25 years, I...
What are you trying to protect?
Article Summary The first thing to reflect upon when think about cybersecurity is “What are you trying to protect?” In most businesses, what you are trying to protect is data, not machines. So, when thinking about what data you need to protect rather than the machines you need to protect....
How are you going to back up your data? (Part 1)
Article Summary In part 1, I describe the two types of backups. An Image backup is tied to the physical structure of the device you are backing up. A full restore of an image backup must be to a device the same size or bigger and resulting in an exact copy of...
How are you going to back up your data? (Part 2)
Article Summary There are three types of backup strategies, full, incremental and differential. A full backup backs up everything, regardless if it has been backed up before or not. A restore from a full backup is easy because everything is available and there are no dependencies on other backups. The...
Who are you? Who, who…who, who
Article Summary Identity is based on one or more of three factors: Something you know (like your name), Something you have (like a government ID) and Something you are (like a fingerprint). Each of these factors has their pluses and minuses. For example, Something you know, like a password, can...
Closed – Gone Phishing
Article Summary Phishing is where an attacker sends a fraudulent message designed to reveal sensitive information or to perform malevolent actions. Spear Phishing is a directed email attack against specific persons. Whaling is a Phishing attack aimed at senior executive personnel. One style of phishing attack is to send an...
Backup/Recovery, Disaster Recovery, Business Continuity – What’s the difference?
Article Summary In talking to colleagues, there appears to be some confusion as to the differences between Backup/Recovery, Disaster Recovery and Business Continuity. Backup/Recovery pertains to the saving and restoration of data.Disaster Recovery pertains to a plan for the restoration of operations after a physical disaster such as a fire.Business...
Edge Security – Endpoint Security, what’s the difference?
Article Summary Edge Security is hardware or software to protect your internal network from the Internet. Endpoint Security is anti-malware software on a device such as a computer, phone, tablet or similar device. Both types of security are important for the small business. Endpoint security has evolved beyond simple virus...