Going back to the office? It may seem like a lifetime since you’ve been there; a quick reminder of security measures to take.
Nowadays, we all need to be on our guard against cyber threats.
Everyone who interacts with the internet – even in tiny ways – should know about the digital dangers that are lurking and how to stay safe. Cyber-vigilance is frankly a must for everyone, not just those in IT.
Yet, as with most things tech-related, there is a lot of complex jargon within the field of cyber security. So, let’s break down some of the more common terms into plain English…
Antivirus
Antivirus tools are designed to detect and remove viruses and malware (malicious software). Antivirus tools are usually presented as software intended to protect an individual device, but many next-gen firewalls contain “gateway” antivirus tools that stop malware before it enters the network. It’s best to use both. The term is often used interchangeably with Malware.
Content filtering
Content filtering is the practice of filtering out access to undesirable online content within a network or organisation. Content filtering is commonly used to prevent access to sources of cyber threats, but can also be used to stop users from accessing unprofessional websites. Modern firewalls often come with content filtration capabilities, but filtration can also be implemented through DNS controls.
Firewall
A firewall is a system that controls the incoming and outgoing traffic on a device or network in line with certain predefined rules. Using these rules, firewalls protect networks and devices from unauthorised access and known vulnerabilities. Acting like a gatekeeper, a firewall will let safe, permitted traffic pass through but stop disallowed or potentially dangerous traffic from entering. Hardware firewalls are generally used in business applications, but software firewalls are also available for personal, standalone PCs and devices.
Intrusion Prevention System (IPS)
An Intrusion Prevention System monitors a network to protect it against known threats, suspicious traffic patterns, DoS attacks, and the spread of malware. If the IPS detects suspicious activity, it can actively take preventative measures like terminating traffic flows, shutting down network hardware, and amending firewall rules. Check out our articles “What is an Intrusion Prevention System?” and “What is a Wireless Intrusion Prevention System (WIPS)?” for more.
Multi-Factor Authentication (MFA)
MFA is a digital access control measure which adds extra authentication steps to a login process, aside from standard factors like username and password. This ensures that whoever logging in is definitely who they say they are. Additional verification factors can include a one-time-use texted pin code, a secure code generated by an app, individual security questions/answers, or a person’s fingerprint. Learn more in this blog: “What is MFA?“.
Virtual Private Network (VPN)
A VPN is a network of devices, connected over the open internet, whose communications are totally encrypted for privacy and security in transit. This means that the network’s users can be in completely different locations around the world, but are still able to securely communicate with each other as if they were on the same physical network in the same building. This is an example of an enterprise remote-access VPN, but consumer VPNs are also available to the general public to provide enhanced privacy online.
Web Application Firewall (WAF)
A WAF monitors and filters web traffic moving to and from your cloud resources, online databases, website(s), or web applications. WAFs serve as a protective layer around your crucial online resources, protecting them from hacks, data breaches, denial of service attacks, unauthorised access, and much more. If your website or cloud resources tick any of the boxes listed in our article “What is a WAF?”, then you need a WAF!
Worried that you may not be able to fend off some of the threats discussed here? Don’t worry, just book a free cyber health check with us. All you’ll need is about an hour of your time, a moderate knowledge of your network, and an open mind! There’s no obligation to buy, and we try to suggest changes to your existing set up wherever possible. Book your health check today – just drop us a line or call 0808 1644414.