Layered Security

We will match common real life scenarios with IT scenarios so you can grasp the concept of layered security.


Scenario 1.
You protect your home from intruders by:multiple security protection
Fences, alarm beams and/or outdoor cameras and/or dogs, iron frameworks behind windows and doors and the last obstacle would be the actual doors and windows themselves.
In this scenario the thief would need to go through all these obstacles to be able to enter your home.
The same concept applies for layered security.
Protect the arrival of malicious content via email and/or web by implementing email and/or web protection.
Have a Unified Tread Management system in place that scans for viruses and spam while passing through the device.
Have a quality antivirus and malware endpoint protection.
Have the operating system and software in use patch regularly.
Use an account with standard user rights.


Scenario 2.web protection
A tourist arrives at our island.
You advise him to not to go to xxx neighborhood.
Again the same concepts applies to IT.
We know which websites are known for having botnets and other viruses.
We also know that websites with “free” stuff may also contain free viruses ūüôā
By blocking access to known websites with malicious content, we are already limiting risks of infections.


Scenario 3.
You are not an electrician so a handyman comes in your house to fix the electrical circuity and then some jewels disappear.USB Virus Alert
Our IT equivalent would be that you plug in an usb stick and it just happens to have a virus on it.
By having a professional graded endpoint security software we can prevent infections that originates on the local pc/network.
An antivirus system that works solely on virus definitions is not enough, signature based systems can block only 30-50% of known viruses.
In addition since you are working with standards rights, which per default limits software installs, the virus may not install (or does not install fully).


Scenario 4.secured protocol
At the airport you are go through the metal detector door and or the security guards may set you apart and scan you with a manual metal detector to check for weapons.
Our comparison.
Having a firewall in place works like the security guard.
It scans all incoming and outgoing traffic (of the allowed ports that you configured) to see if they are allowed to go through.
It blocks the traffic of the ports that are not allowed to go through.
It detects if a hacker is trying to use their hackers’ tools to compromise your system. (for example, trying to hack into your website).
Note that an Unified Threath Management system will provide the above mentioned functions and more in one device.


Scenario 5.
You take a vaccine in order to prevent contagious diseases.patching multiple os
5 Star Technology’s comparison would be:
We know that beside the operating system and Microsoft products, there are lots of other software ( examples: Adobe Systems Incorporated, mozilla and google family products, etc ) that also do have vulnerabilities that can be leveraged to deliver a malicious payload.
By having your software up to date (the antibodies), you minimize the risk that the bad guys can use your non-patched software to install their malware on your system.


Summary.
As you noticed we have systems in place that.
A: prevent you from even accessing the infected content.
B: scan the internet traffic before the traffic arrives at your workstation.
C: protects the local pc/network


Just like your home security system which provides you with camera’s to monitor your home environment, 5 Star Technology does provide you with dashboard access to your own unique network so you can check the status of the devices yourself.
Also you will receive weekly and monthly reports on the key checkpoints for your environment.


Contact 5 Star Technology to help you secure your network just as you secure your home.