Protecting yourself from Cyber security threats is definitely a “how long is a piece of string” challenge. You can invest in password managers, privileged access platforms, external threat testing, dark web scanning and all sorts of cool things to keep you safe. Sometimes the choices become a bit overwhelming, or it isn’t in budget to implement these protections. For these reasons we have put together the Junius Essentials.
The Essentials is a 4-piece protection layer for your users to implement the baseline necessities of cyber security, i.e. more protection is always better but you should at least have these four layers in place.
So what are the four?
Email Security
Our inboxes are the primary “threat vector” for security breaches. You could have the most robust firewall in place with the best anti-virus on the market but some of the biggest security breaches ever are the result of a few clicks on a nefarious email.
Remote Monitoring and Management (RMM)
RMM (Remote Monitoring and Management) is like our digital health check-up, continuously monitoring our systems for any problems so that we can fix them before they cause unnecessary downtime. Think of it as getting your car serviced regularly— it keeps everything running smoothly!
According to Kaseya, 60% of businesses that experienced a successful cyberattack cited unpatched vulnerabilities as a contributing factor. RMM tools usually include a patch management service which ensures that software vulnerabilities with your main Operating System or third party software such as Adobe Acrobat or Zoom are quickly addressed, reducing the risk of cyber attacks.
Endpoint Security (AV and EDR)
Managed EDR is our security guard, always on duty to detect and respond to threats targeting our devices. EDR is also the “eye in the sky” for your PC. It watches over the programs running on your PC for anything out of the ordinary. With advanced threat detection, we can quickly identify and neutralise potential security risks, preventing them from escalating into full-blown incidents.
Junius provides a managed EDR platform which is monitored by an Aussie based Security Operations Centre. Should the endpoint detect a problem, risk or anomaly a cyber security expert reviews the alert and actions accordingly.
Cloud to Cloud Backup
Cloud based email and files (i.e. SharePoint and OneDrive) are awesome. There is a common misconception that these cloud services have a backup in place. There’s no actual backup, just redundancy. To clarify, if Godzilla attacks Microsoft’s data centre in Sydney they have a replication of this data in another location. It’s not a backup, it’s a copy.
A Cloud to Cloud Backup ensures that should you or your team accidentally delete a file or email you can restore this content from a specific point in time from a third party backup provider.
Just sort it for us please
Sure! We have a bundle called the Junius Essentials which provides these four elements in a managed service. We configure, deploy and manage the 4 services for you, and can scale up or down depending on your requirements. No lock-in contracts, just some peace of mind that you’ve got the Essentials in place.
If you’re keen to talk about it give us a call on 1300 JUNIUS (1300 586 487) or email [email protected].
What else is worth talking about?
Loads of stuff actually, but let’s keep things simple. Here are a few considerations I would highly recommend depending on your risk appetite:
- A Password Manager for simplifying and safeguarding your login credentials
- Security Awareness and Training to ensure you’re keeping those muscles trained
- Darkweb ID Scanning to see where you have been compromised
- The Little Black Book of Scams to read up on the range of threats out there
There’s loads of considerations when it comes to cyber security but if we could pass on just one piece of advice regarding IT in general it would be to pretty please with sugar on top have the Essentials sorted in some form. If you’re unsure if you’ve got the 4 boxes ticked feel free to give us a call.