Simon Yock

03-anti-virus

Antivirus Revisited

The reason Anti-Virus is still current is because viruses still pose a major threat to our information systems and that isn’t changing any time soon. Just because we’re focused on ransomware and other immediate dangers doesn’t mean the threats are gone; like a good vaccine, we’re just able to handle their presence.

operating-system-hardening

OS Hardening

This is where we get down into the weeds into the heart of the systems on our networks. While some of the other components we spoke of earlier such as patching and managing permissions, here we focus on the core of what makes the system tick.

05-capture

Capturing Network Traffic

Also known as “sniffing”, capturing network traffic can be either proactive or reactive depending on the application. The goal is to capture the data traversing the network for the purposes of analysis and intelligence gathering and this can be done on wired or wireless networks

nids-nips

Network IDS / IPS

Also known simply as IDS or IPS, Intrusion Detection Systems / Intrusion Prevention Systems monitor network traffic for anomalies based on signatures and heuristics that vary from vendor to vendor and from implementation to implementation.  Basically, they look for something that shouldn’t be there to log, alert, or take an action based on the rules we configure.

email-encryption

Email Encryption

Encrypting emails between the sending and receiving servers sounds like a really good idea and when you think about it, it is. We often think of encrypting the communication between our endpoints and servers and between servers themselves to ensure our data is secure.

02-antivirus

Anti-virus

Like floppy disks, CRT monitors, and short commutes in light traffic, Anti-Virus seems to have fallen to the deep, dark recesses of the past. There was a time when we happily went about using our computers with little more than the operating system and a few basic applications and without the fear of the big, bad Internet.

01-user-education

User Education

The users of your information systems are the key to your organisation’s success.  These are the people you have sought out to perform key roles in the organisation and the very prosperity and growth of the enterprise hinges on their engagement, capability, and capacity to deliver.