Part 9 of 9 - Conclusion

How To Secure Your SMB Network – Part 9 of 9 – Conclusion

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 9 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. Conclusion The layered approach that Banks Technology Services uses to secure our client’s networks was  developed over …

Philip BanksHow To Secure Your SMB Network – Part 9 of 9 – Conclusion
Part 8 of 9 - Administrative Rights

How To Secure Your SMB Network – Part 8 of 9 – Administrative Rights

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 8 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Are Local Administrative Rights Local Administrative Rights give you full access to a computer. This allows …

Philip BanksHow To Secure Your SMB Network – Part 8 of 9 – Administrative Rights
Part 7 of 9 - Patching

How To Secure Your SMB Network – Part 7 of 9 – Patching

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 7 of an 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Patching Patching is the process of approving and installing updates to the software and operating …

Philip BanksHow To Secure Your SMB Network – Part 7 of 9 – Patching
Part 6 of 9 - Endpoint Security

How To Secure Your SMB Network – Part 6 of 9 – Endpoint Security

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 6 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Endpoint Security Think of Endpoint Security Software as the last line of defense in our …

Philip BanksHow To Secure Your SMB Network – Part 6 of 9 – Endpoint Security
Part 5 of 9 - Spam Filtering

How To Secure Your SMB Network – Part 5 of 9 – Spam Filtering

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 5 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Spam Filtering Spam Filtering is essentially separating the “good” email from the “junk” email. It’s …

Philip BanksHow To Secure Your SMB Network – Part 5 of 9 – Spam Filtering
Part 4 of 9 - Software Restriction Policies

How To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies

Philip Banks Security 3 Comments

Welcome to How To Secure Your SMB Network! This is part 4 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What are Software Restriction Policies Software restriction policies define the files and/or file types that are able …

Philip BanksHow To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies
Part 3 of 9 - Content Filtering

How To Secure Your SMB Network – Part 3 of 9 – Content Filtering

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 3 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Content Filtering Content Filtering is the process of screening or restricting information that a computer or …

Philip BanksHow To Secure Your SMB Network – Part 3 of 9 – Content Filtering
Fake Tech Support Scams

Fake Tech Support Scams

Philip Banks Security Leave a Comment

A Fake Tech Support Scam involves a scammer calling you at home or work and requesting access to your computer. They’ll say your computer is infected with a virus or a myriad of other claims. These types of scams have been around for several years now, but recently there has been an uptick in activity. Have you received a call from “Microsoft” or other “Tech Departments” stating that your computer is infected or “sending out errors”? Please let us know about it in the comments below. How It works Here’s …

Philip BanksFake Tech Support Scams
Part 2 of 9 - UTM Gateway

How To Secure Your SMB Network – Part 2 of 9 – UTM Gateway

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 2 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as a puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is a UTM Gateway UTM stands for Unified Threat Management. The idea is to block security …

Philip BanksHow To Secure Your SMB Network – Part 2 of 9 – UTM Gateway
Part 1 of 9 - Network Security Principles

How To Secure Your SMB Network – Part 1 of 9 – Network Security Principles

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 1 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as a puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. Layered Approach to Network Security Our philosophy takes a layered approach to network security. No one …

Philip BanksHow To Secure Your SMB Network – Part 1 of 9 – Network Security Principles