Article | September 29, 2017

A Balanced Approach To Cybersecurity Risk Mitigation

By Jeff Jackson, President, Summit Computer Services, Member of The ASCII Group since 2017

Technology is essential to mitigate the risk of exposure to cyberattack.  Note that mitigate means to reduce or lessen in severity, not preclude.  It’s often difficult for IT service providers (ITSPs) to convince business owners that no one can guarantee complete elimination of cyberattack risk. Anyone with a computer connected to the internet is under attack. Your best option is preparation for the inevitable.

Security technology is applied in layers starting outside the organization and then working inward. From the outside, a secure DNS (Domain Name Service) protects end users by looking up the IP address when they enter a URL into their browser, and then blocking access to known bad websites. 

Most infections originate with websites and email.  Email spam and virus protection filters incoming email by looking for known bad domains, email attachments and email content. Email spam filters also monitor sent email to protect your domain from being blacklisted should one of your computers become infected with a spam-bot.

A next generation firewall is essential for protection of digital business assets. It goes beyond filtering content, looking for intrusions and bad content, using artificial intelligence to recognize behavior patterns and block them before they do any harm.

access the Article!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights