Spectre and Meltdown

Spectre and Meltdown: What You Need To Know

Philip Banks Security Leave a Comment

It seems to happen more and more frequently, a new vulnerability is publicized and everyone rushes to patch their computers and devices. This time, it’s two different, but very closely related, vulnerabilities, Spectre and Meltdown. Normally these vulnerabilities are software based. A bug in Internet Explorer, a back door in Microsoft Office, an exploit in Adobe Flash. Today we’re looking at something quite a bit different, Hardware Vulnerabilities. What Is Spectre and Meltdown? On January 3rd, 2018 several researchers, including Google’s Project Zero team, found that a design used in …

Philip BanksSpectre and Meltdown: What You Need To Know

Banks Technology Services Featured Among Cyber Security Experts

Philip Banks Media Leave a Comment

Banks Technology Services was recently featured on IT Security Central’s panel of Cyber Security Experts. The panel discussed the best ways to protect against Malware infections. Take a look at the article here: How to Protect Against Malware Infections: The Top Experts Speak    

Philip BanksBanks Technology Services Featured Among Cyber Security Experts

6 Ways To Keep Your Children Safe Online

Philip Banks Internet Safety Leave a Comment

It’s a jungle out there. Every parent has heard horror stories about the dangers of the internet. So, how do we keep children safe online? How do you balance the good and the bad of the internet and make sure your children stay safe. The internet can provide endless learning, exploration, and entertainment for your children. Unfortunately it can also lead to dark and dangerous places and situations for children. We have six tips that should prevent your children from finding themselves in unfortunate situations online. Like most things when …

Philip Banks6 Ways To Keep Your Children Safe Online
Part 9 of 9 - Conclusion

How To Secure Your SMB Network – Part 9 of 9 – Conclusion

Philip Banks Security 2 Comments

Welcome to How To Secure Your SMB Network! This is part 9 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. Conclusion The layered approach that Banks Technology Services uses to secure our client’s networks was  developed over …

Philip BanksHow To Secure Your SMB Network – Part 9 of 9 – Conclusion
Part 8 of 9 - Administrative Rights

How To Secure Your SMB Network – Part 8 of 9 – Administrative Rights

Philip Banks Security 3 Comments

Welcome to How To Secure Your SMB Network! This is part 8 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Are Local Administrative Rights Local Administrative Rights give you full access to a computer. This allows …

Philip BanksHow To Secure Your SMB Network – Part 8 of 9 – Administrative Rights
Part 7 of 9 - Patching

How To Secure Your SMB Network – Part 7 of 9 – Patching

Philip Banks Security 3 Comments

Welcome to How To Secure Your SMB Network! This is part 7 of an 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Patching Patching is the process of approving and installing updates to the software and operating …

Philip BanksHow To Secure Your SMB Network – Part 7 of 9 – Patching
Part 6 of 9 - Endpoint Security

How To Secure Your SMB Network – Part 6 of 9 – Endpoint Security

Philip Banks Security 2 Comments

Welcome to How To Secure Your SMB Network! This is part 6 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Endpoint Security Think of Endpoint Security Software as the last line of defense in our …

Philip BanksHow To Secure Your SMB Network – Part 6 of 9 – Endpoint Security
Part 5 of 9 - Spam Filtering

How To Secure Your SMB Network – Part 5 of 9 – Spam Filtering

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 5 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What Is Spam Filtering Spam Filtering is essentially separating the “good” email from the “junk” email. It’s …

Philip BanksHow To Secure Your SMB Network – Part 5 of 9 – Spam Filtering
Part 4 of 9 - Software Restriction Policies

How To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies

Philip Banks Security 4 Comments

Welcome to How To Secure Your SMB Network! This is part 4 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What are Software Restriction Policies Software restriction policies define the files and/or file types that are able …

Philip BanksHow To Secure Your SMB Network – Part 4 of 9 – Software Restriction Policies
Part 3 of 9 - Content Filtering

How To Secure Your SMB Network – Part 3 of 9 – Content Filtering

Philip Banks Security 5 Comments

Welcome to How To Secure Your SMB Network! This is part 3 of a 9 part series that discusses our approach to Network Security and how we secure client networks. As you will see there are many facets that go into creating a secure network. Think of it as puzzle with each piece playing an important role. The days of installing Norton Anti-Virus on your computer and thinking you are safe are over. What is Content Filtering Content Filtering is the process of screening or restricting information that a computer or …

Philip BanksHow To Secure Your SMB Network – Part 3 of 9 – Content Filtering