Part 9 of 9 - Conclusion

How To Secure Your SMB Network – Part 9 of 9 – Conclusion

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 9 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. Conclusion The layered approach that Banks Technology Services uses to secure our client’s networks was  developed over …

Philip BanksHow To Secure Your SMB Network – Part 9 of 9 – Conclusion
Part 8 of 9 - Administrative Rights

How To Secure Your SMB Network – Part 8 of 9 – Administrative Rights

Philip Banks Security 1 Comment

Welcome to How To Secure Your SMB Network! This is part 8 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Are Local Administrative Rights Local Administrative Rights give you full access to a computer. This allows …

Philip BanksHow To Secure Your SMB Network – Part 8 of 9 – Administrative Rights
Part 7 of 9 - Patching

How To Secure Your SMB Network – Part 7 of 9 – Patching

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 7 of an 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Patching Patching is the process of approving and installing updates to the software and operating …

Philip BanksHow To Secure Your SMB Network – Part 7 of 9 – Patching
Part 6 of 9 - Endpoint Security

How To Secure Your SMB Network – Part 6 of 9 – Endpoint Security

Philip Banks Security Leave a Comment

Welcome to How To Secure Your SMB Network! This is part 6 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Endpoint Security Think of Endpoint Security Software as the last line of defense in our …

Philip BanksHow To Secure Your SMB Network – Part 6 of 9 – Endpoint Security
Part 5 of 9 - Spam Filtering

How To Secure Your SMB Network – Part 5 of 9 – Spam Filtering

Philip Banks Security 2 Comments

Welcome to How To Secure Your SMB Network! This is part 5 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Spam Filtering Spam Filtering is essentially separating the “good” email from the “junk” email. It’s …

Philip BanksHow To Secure Your SMB Network – Part 5 of 9 – Spam Filtering
Part 4 of 9 - Software Restriction Policies

How To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 4 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What are Software Restriction Policies Software restriction policies define the files and/or file types that are able …

Philip BanksHow To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies
Part 3 of 9 - Content Filtering

How To Secure Your SMB Network – Part 3 of 9 – Content Filtering

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 3 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Content Filtering Content Filtering is the process of screening or restricting information that a computer or …

Philip BanksHow To Secure Your SMB Network – Part 3 of 9 – Content Filtering
Part 2 of 9 - UTM Gateway

How To Secure Your SMB Network – Part 2 of 9 – UTM Gateway

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 2 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as a puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is a UTM Gateway UTM stands for Unified Threat Management. The idea is to block security …

Philip BanksHow To Secure Your SMB Network – Part 2 of 9 – UTM Gateway
Part 1 of 9 - Network Security Principles

How To Secure Your SMB Network – Part 1 of 9 – Network Security Principles

Philip Banks Security 8 Comments

Welcome to How To Secure Your SMB Network! This is part 1 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as a puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. Layered Approach to Network Security Our philosophy takes a layered approach to network security. No one …

Philip BanksHow To Secure Your SMB Network – Part 1 of 9 – Network Security Principles