Reference Pages

Table of Contents

    What is a small business, and what should it do about cybersecurity?

    This is the first of a series of planned posts designed to help the owner(s) of a small business make decisions on what to do about cybersecurity in their business. While I have been supporting the IT needs of small businesses as a profession for the last 25 years, I...
    Read More about What is a small business, and what should it do about cybersecurity?

    What are you trying to protect?

    Article Summary The first thing to reflect upon when think about cybersecurity is “What are you trying to protect?”  In most businesses, what you are trying to protect is data, not machines.  So, when thinking about what data you need to protect rather than the machines you need to protect....
    Read More about What are you trying to protect?

    How are you going to back up your data? (Part 1)

    Article Summary In part 1, I describe the two types of backups. An Image backup is tied to the physical structure of the device you are backing up. A full restore of an image backup must be to a device the same size or bigger and resulting in an exact copy of...
    Read More about How are you going to back up your data? (Part 1)

    How are you going to back up your data? (Part 2)

    Article Summary There are three types of backup strategies, full, incremental and differential. A full backup backs up everything, regardless if it has been backed up before or not. A restore from a full backup is easy because everything is available and there are no dependencies on other backups. The...
    Read More about How are you going to back up your data? (Part 2)

    Who are you?  Who, who…who, who

    Article Summary Identity is based on one or more of three factors: Something you know (like your name), Something you have (like a government ID) and Something you are (like a fingerprint).   Each of these factors has their pluses and minuses. For example, Something you know, like a password, can...
    Read More about Who are you?  Who, who…who, who

    Closed – Gone Phishing

    Article Summary Phishing is where an attacker sends a fraudulent message designed to reveal sensitive information or to perform malevolent actions. Spear Phishing is a directed email attack against specific persons. Whaling is a Phishing attack aimed at senior executive personnel. One style of phishing attack is to send an...
    Read More about Closed – Gone Phishing

    Backup/Recovery, Disaster Recovery, Business Continuity – What’s the difference?

    Article Summary In talking to colleagues, there appears to be some confusion as to the differences between Backup/Recovery, Disaster Recovery and Business Continuity. Backup/Recovery pertains to the saving and restoration of data.Disaster Recovery pertains to a plan for the restoration of operations after a physical disaster such as a fire.Business...
    Read More about Backup/Recovery, Disaster Recovery, Business Continuity – What’s the difference?

    Edge Security – Endpoint Security, what’s the difference?

    Article Summary Edge Security is hardware or software to protect your internal network from the Internet.  Endpoint Security is anti-malware software on a device such as a computer, phone, tablet or similar device. Both types of security are important for the small business.  Endpoint security has evolved beyond simple virus...
    Read More about Edge Security – Endpoint Security, what’s the difference?