2 min read

[Security Tip] Anti-Virus Is Simply Not Enough

By Prime Care Tech Office of Security and Compliance on Mon, Jun 20, 2022 @ 11:29 AM

It’s safe to say traditional antivirus software simply isn’t enough to protect against cyber-attacks anymore. The current threat landscape and cyber insurance carriers demand a proactive approach to security. It’s time to update your antivirus solutions – and immediately.

One updated defense solution is endpoint detection and response (EDR).  EDR complements and enhances current anti-virus and firewall security protocols to help thwart attacks and optimize threat hunting operations. It is not a replacement for these security platforms but another essential tool in the security stack. But what exactly is EDR?

How Does EDR Protect Your Organization

As threat actors are getting more sophisticated, you need to as well. Traditional anti-virus and anti-malware software are no longer considered sufficient to thwart cyberattacks; it’s too easily bypassed. One of the next-generation tools in protecting devices is EDR, which goes well beyond standard anti-virus/anti-malware.

EDR is an integrated endpoint (i.e., desktops/laptops) security protocol that combines endpoint data collection and continuous real-time monitoring with rules-based automated response and behavioral analysis capabilities. In other words, this is a security system that proactively detects and investigates suspicious activity on hosts (i.e., servers) and endpoints.

The primary objectives of EDR security systems are as follows:

  • Automatically identify and respond to known threats, remove or contain them, and alert the security team
  • Continuously analyze data to identify threat patterns or suspicious behavior quickly
  • Monitor and collect activity data from various endpoints and look out for potential threats

Wrapping Up

We’re all acutely aware of the risks from various cyber threat actors around the world. It is our job and yours to do everything in our collective power to keep our networks and data safe. One small misstep by you or an employee (i.e., clicking on a link or opening an attachment in a phishing email), can lead to catastrophic results.

This is why many of you carry cyber insurance, and rightly so. The cyber insurance carriers are there to help “put you back together” in the event of a ransomware attack. As the success of ransomware attacks and cyber insurance carrier payouts increase, the cyber insurance carriers react by requiring you to implement more stringent information technology defenses, such as EDR. Consequently, deploying EDR has become table stakes in addressing cyber threats.

Prime Care's partnership with McAfee can help. 

Conduct Self-Audit Now

Topics: cyber security malware cyber attack antivirus Endpoint Detection and Response edr
2 min read

Are you securing your castle from cyber criminals?

By Prime Care Tech Marketing on Fri, Jul 23, 2021 @ 12:18 PM

We see many ads on TV about protecting our personal information. But what about protecting your business? Protecting your business is just as important. So treat your business like a modern-day castle. Review this Q&A for a quick education on how you can do it.



How can my business be attacked?

  • Ransomware
    • Hackers encrypt your files
    • Work comes to a stop
    • Potentially a permanent file loss
    • Even if you pay, no guarantees
  • Cyber email/extortion
    • Very common as part of ransomware attacks now
    • Steal your files and release them on the dark web if you don’t pay
  • Access your computer system
    • Steal intellectual property or company secrets to sell to competitors
    • Gain access to your bank account; transfer funds
    • If you store/process confidential information, they can sell:
      • Financial – average $6/record
      • Medical – as much as $259/record


How do these attacks impact my organization?

  • Ransom cost to recover data
  • Competitor access to your company secrets
  • Federal/State fines due to loss of confidential information
  • Negative impact on the reputation of your company
  • Criminal negligence charges from State governments

 

How can I protect our network from hackers?

Think of your organization like it’s a castle from the olden days. What would you need to protect your castle? A high wall, a locked gate, and armed guards inside might help?

 

How can I build a wall for our 'castle'?

  • Modern and managed firewall
  • Wi-Fi password changed regularly
  • Separate guest and business Wi-Fi with different passwords
  • Antivirus on your servers, laptops and desktops
  • Email protection

 

How can I lock the gate of our 'castle'?

  • Passwords
    • Require them, change them often
    • Employ multi-factor authorization (MFA)
  • Physical security
    • Lock server and network equipment rooms
    • Encrypt computers/laptops in case of theft
  • Appropriate access
    • Limit access to need to know
    • Extend minimum access necessary
  • Data backups
    • Keep backups of your backups somewhere safe

 

How can I train staff to guard our 'castle'?  

  • Provide ongoing training, not just for new employees.
  • Conduct phishing awareness training and exercises
  • Train staff on response to suspicious emails, websites, and computer behavior
  • Prepare an incident response plan (IRP) in case you are a victim of an attack

If you need help protecting your castle, get in touch for an IT assessment today.

What's an IT Assessment?

Topics: cyber security IT assessment cyber attack

Featured

Posts by Tag

See all