Tools to Combat Cyber Attacks

Earlier this month we blogged about cybersecurity, and the different types of attacks companies face. Those include malware, DoS, phishing, and ransomware. That blog can be found here. In this article, we'll look at different tools your company should be using to combat these types of attacks.

These days it's absolutely imperative for every single company to deliver to all of its employees the ways in which phishing attacks occur, what to look for, and what to do to combat them.

byJeff McHugh

Quality, updated virus software

Duh! This had better NOT be news to anyone out there. BUT ... there are different types of virus coverage, and simply relying on free coverage is a huge no-no.

JTM Technology recommends CrowdStrike Falcon: Endpoint Protection these days. But we realize it's not for every company, or more specifically every company's budget. Here is a nice summary of other offerings that provide virus protection, network firewall, web shield, and email protection (including spam and phishing filtering).

  • Avast Business Antivirus Pro
  • Check Point SandBlast Agent
  • ESET PROTECT Advanced
  • Bitdefender GravityZone Business Security
  • Kaspersky Endpoint Security Cloud
  • Sophos Endpoint Protection Advanced
  • F-Secure SAFE
  • Webroot Business Endpoint Protection

Company wide education on phishing tactics

At one time, this approach was something only companies with large budgets should do. That time is loooong gone. These days it's absolutely imperative for every single company to deliver to all of its employees the ways in which phishing attacks occur, what to look for, and what to do to combat them.

JTM Technology offers comprehensive educational training in identifying phishing techniques, reporting them, etc.

Multi-Factor Authentication

These days there are many multi-factor authentication offerings. Every important application used on the network should have a 2-factor authentication system installed. It's an extra layer of protection against cybercriminals. It’s simple, and highly efficient. We can help set this up for you, and you can call us at 855-JTM-TECH for more information.

Test your security regularly!

We can help with this process in a variety of ways. For instance, if you have Office365, there is a tool to test the security of your corporate setup.

Beyond that, we have ways to test this. Penetration testing is a process in which an outside group (like JTM Technology!) can come in and basically kick the tires of your systems, checking for cracks in the foundation of your security systems. We have a lot of experience doing just that, and you can call us at 855-JTM-TECH for more information.