The success of any business in our time is directly related to the level of technologies used. Any business uses computers, software, the Internet, and communication networks in its activities. The higher the success and activity of a company, the more its activities depend on automation tools, and the more acute the problem of information security becomes.
From a managers' or small and medium-sized business owners' point of view, the cyber-criminals are only interested in large businesses and small organisations are not in danger, because no one will chase them. In fact, this is not the case. Any computer, tablet, or smartphone in any organisation can be “infected” with malware from a phishing site, email or flash drive, or through a non-targeted attack. In reality, cybercriminals in mass attacks do not even know which company they are attacking, everything happens automatically. But if big business has the necessary resources to resist threats, or, at least, to neutralise their impact, then the consequences for small businesses can be fatal.
Let's consider as an example, a private architectural firm. Suppose this firm has been working on a large shopping center project for the past few months. All their plans, schemes, strategy graphs, and so on were placed on the network storage to get the convenience of collaboration. The chief architect of the project has access to the repository with a network drive, with full rights to record to any folder. One day, he opens an email attachment with a virus inside. The virus encrypts all files on a personal computer and on the network storage. The free antivirus that has not been updated for a long time did not notice the ransomware, and there is nothing to decrypt the files. In addition, it turns out that the backup has not been done for a long time. As a result, all work over several months is lost, the company suffers serious losses and reputational damage.
The strategy of information security and measures taken can be quite complex depending on the tasks, business processes in the enterprise, and capabilities.
Loss of information and inability to conduct business are the main risks of information security for small and medium-sized businesses. Here's a minimal set of solutions to help you protect your company early on.
Improve the culture of your employees to work safely with information on the Internet.
Provide access to confidential information only to key employees. Try to exclude full access to data where it is not required. Separate read-only and editable data.
Make regular backups of critical important information for business and keep them separate.
Secure your office network. Use "firewalls", encrypted https, sftp, vpn channels.
Use a good antivirus on all corporate computers, laptops, tablets, and phones. Update your software regularly.
To organise the integrated network and anti-virus security system, we offer world-class, innovative products from Sophos. Sophos is focused on SMB sales rather than Enterprise, with the result that all of their products are tailored to the specifics of SMBs. At the moment, Sophos has a fairly extensive range of information security products: XG Firewall, Intercept X Endpoint, Intercept X for Server, Managed Threat Response, Sophos Cloud Optix, Sophos Central, Sophos Email, Secure Web Gateway, Sophos Wireless, Sophos Mobile, Phish Threat, SafeGuard Encryption.
All of these products are integrated with each other and designed to work in a single managed security system to protect all aspects of the IT infrastructure. However, you can only choose those that fit your needs and your business IT infrastructure.
Let's consider products useful to any small and medium business:
XG Firewall is a next generation firewall with advanced routing and network security, threat detection and response, web protection, mail protection, VPN. The applied advanced technologies provide unprecedented performance, manageability and high level of protection. Available in software and hardware form. The hardware version has models of different performance, both desktop and for installation in a telecommunication cabinet, which allows you to keep the optimal cost for your tasks.
Intercept X Endpoint is a software, an endpoint protection system based on deep machine learning that detects both known and unknown malware without relying on signatures. It has the ability to quickly investigate incidents, prevent unauthorized data encryption and restore, isolate an infected device until the malicious application is completely removed. Rather than using hundreds of millions of known malware signatures, Intercept X focuses on a relatively small group of techniques used to distribute malware. This approach allows you to protect yourself from both known viruses and attacks, and unknown ones. Intercept X includes anti-ransomware technology that detects malicious encryption processes and disables them before they spread across your network. It prevents ransomware of both file and master boot records. Any encrypted files are brought back to a secure state with CryptoGuard, which rolls back unauthorized file encryption in seconds, which means your employees can continue to work uninterrupted with minimal impact to business continuity.
Sophos Wireless is a complete solution for building a manageable and secure WiFi network. Includes a wide variety of managed AP models for outdoor, wall, ceiling and desktop deployment. The models also differ in performance and functionality. Sophos AP Series Access Points can be managed through any Sophos XG, Sophos SG UTM firewall, or in the cloud through Sophos Central. In addition, AP series access points can be controlled both as part of a single security system for all Sophos products, and separately. Sophos Wireless is highly scalable, allowing you to create large managed wifi networks. With Sophos Wireless, you will always know the status of your Wi-Fi networks, hotspots, connecting clients and environment, load and performance in order to determine potential risks or inappropriate use of your resources. Rogue AP Detection automatically classifies nearby Wi-Fi networks to identify threats and prevent Wi-Fi intrusion attempts. And using a daily password or time-based voucher, you can set up guest access to display the hotspot portal with your own terms of service to visitors, contractors, and other guests on your network.
Sophos Mobile. The use of mobile devices in corporate networks is one of the most dangerous factors in information security. Especially smartphones, since in most cases they have direct access to the Internet, often leave the office, and the exchange of files via e-mail, instant messengers and WWW can be even more than on a personal computer. Control of their use without the use of technical means in practice is not possible. Therefore, your information security system must take into account this dangerous factor and provide protection, control and management of mobile devices too. Sophos Mobile - is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10 and macOS devices.
Despite the fact that Sophos has existed since 1985, its products and approach as a whole are very innovative and in terms of the totality of capabilities they compare favorably with their counterparts:
Each Sophos product is focused on solving specialized tasks from securing web access to managing and securing WiFi networks, together they form a manageable comprehensive security system. But you don't have to buy all the products and spend resources to support them, you only pay for the ones you need. Each product allows you to use it both independently and as part of a unified information security system. Simple and clear licensing policy allows you to optimize costs even better.
All Sophos products are managed from a single user-friendly interface in the Sophos Central cloud console. This allows you to manage Sophos products over the Internet, not only on equipment in your office, but also on wearable devices outside the office. This approach also opens up additional opportunities for outsourcing IT support.
Since the Sophos Central management system and console are hosted in the Sophos cloud, you do not need your own IT infrastructure for this.
Sophos products can be either hardware or software. This gives wider application possibilities, for example, it becomes possible to conveniently use it both in the office and in the form of a virtual machine in the infrastructure of a cloud provider like AWS or MS Azure.
Through Sophos Security Heartbeat, Sophos products can share real-time security analytics. Sophos Central synchronizes this data between all security systems, thereby creating even more reliable protection against modern malicious code and targeted attacks.
With the Managed Threat Response (MTR) service, you can subscribe 24/7 to analyze, search for threats and respond immediately to neutralize threats by the Sophos security team.
The complex of advanced technologies, services and concepts applied by Sophos greatly enhances the efficiency of the information security system and it is truly manageable.