8914 Stone Green Way , Louisville, Kentucky 40220-4072

Support: (502) 473-6407 | Sales: (502) 473-9330

Argentum IT

Get Support

  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us

Newsletter Content

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Home
Categories
Tags
Categories:   All Categories
Suggested keywords
x
Search

A Cybersecurity Overview

Newsletter
Dean Lause
Tuesday, 28 May 2019
0 Comments
A Cybersecurity Overview

Cybersecurity is one of the most talked about problems facing the modern business. This is because cybercrime has increased precipitously while businesses have moved more of their processes onto the computer. Planning how to protect your business’ crucial digital resources from corruption and theft has never been more important. We’ll take a look at some of the problems we are seeing that are negatively affecting small and medium-sized businesses' ability to do business effectively.

Before we go into detail about what network security tools your organization should be using, we should say that the whole point of doing all of this is to protect your organization’s investments. You’ve paid for the services, hardware, software, and the time that it has taken to create and store the data, so it only makes sense that you should make the effort necessary to protect it. By protecting your data, you are protecting your staff, your customers, your vendors, and your business. You wouldn’t just leave a bag of money in plain sight inside the front door of your business unless it was locked and you could ensure that no one was coming through it, would you? The same precautions should be taken for your digital assets that, make no mistake about it, are being targeted.

Protecting Business Computing

A business’ computing infrastructure is larger and supports many more services than it ever has in the past. For this reason, we have to start outside the network itself. Cloud services are a big part of today’s business. When they are hosted outside of your network, they are managed by a third-party and one would think they have their own security team handling cybersecurity. Obviously, this can’t be guaranteed, but one would think that if a company is selling processing, applications, or storage over the Internet that their business model depends on their systems remaining secure.

For the end-user to access these systems there is a dedicated access control program attached. Many times organizations will require users to set up two-factor authentication to get the most out of the access control system that accompanies the cloud solution. In the cloud, many different types of software, hardware, and other services are available.

As we get into the outer layers of the network, the first place where a company has secure is called the perimeter of the network. The best way to do this is by deploying a firewall. A properly deployed and maintained firewall will go a long way toward keeping unwanted visitors off of your network.

But in today’s state of things, having only a firewall in place isn’t going to cut it.

Going the Extra Mile

There is now security solutions called Intrusion Prevention Systems (IPS) or Intrusion Detection Systems (IDS). While these solutions aren’t mutually exclusive, and IDS’ job is to tell administrators that there has been a security breach, while an IPS is designed to keep these threats out by attempting to block suspicious activity. An IPS also logs all network traffic, an often substantial undertaking, to ensure that administrators can review, and try to isolate any potentially unwanted action or file that enters the network.

Years ago, this would have been enough to keep most threats out. Today, it’s just the beginning. If you think of a computing network like an onion, every “layer” of the network will get its own access control system and its own firewall. This way each part of a computing network, from the perimeter, to the applications, to the databases where all the data is held are all protected by a different source of encryption. By setting up a tiered access control system that requires authentication in multiple places, it makes it harder for unauthorized access. It also protects your business against one of the biggest threats that it faces each day: phishing attacks.

A phishing attack is one where an outside entity tries to pass off correspondence as legitimate, when it is, in fact, fraudulent. According to Verizon, 90 percent of all network attacks are the result of successful phishing attacks; and, there is only one thing that can keep phishing attacks from being a major problem for your business: Training.

Training Your Staff

Getting your staff trained about phishing may not seem like a priority. After all, you know how long and how much expense it was to get them up-to-speed in the first place, training them about network security could be seen as being out of their purview.

Nothing could be further from the truth.

You have to face that since encryption and cybersecurity solutions are so good, that taking them on directly takes far more time and resources then going after your staff does. Through your employees is the only way in for many of these modern hackers, and rest assured they are going to use your staff as the vessel to get where they want to go...unless you stop them.

Training your staff about phishing and other manners of social engineering is the best way to keep unwanted people out of your network. Think about it, no firewall is going to help you if they access your network with legitimate credentials. Keeping credentials secure and requiring authentication can go a long way toward saving your business from dealing with data breaches, malware, and any other type of hacker-induced network security problem.

If you would like help finding the right cybersecurity strategy for your business’ needs consider the IT professionals at Argentum IT a good solution. Call us today at (502) 473-6407 to learn more.

Tags:
Security Best Practices Network Security

About the author

Dean Lause

Dean Lause

Dean Lause is a technologist to the highest degree. When he was in middle school, he learned and developed small programs using BASIC programming code on his Commodore 64. He was one of the first to post to bulletin boards on the newly emerging “Internet” and built a mini-network in his home. He competed in his senior year of high school, placing 1st regionally, 2nd in State and 17th Nationally in computer specialist competitions. Today, he enjoys technology as much as he did then. In fact, he has a “Smart Home,” with connected devices controlled by A.I., mobile apps, and voice commands. When he is ready to go to sleep, all he needs to say is “Good night,” and Voila! all of the lights in the entire house turn off, the doors lock, the TV/DVR turn off, the house alarm is set and the alarm clock for the morning is ready to go! After a 4-year stint in the Army as a computer specialist, Dean spent the next 20 years in Fortune 500 Enterprise IT environments. He quickly building his IT skill set, becoming an expert in VMWare and Citrix and various other technologies. Dean served as the Director of Network Infrastructure & Security of North American Operations in his last role before joining Argentum IT and completing his MBA with a specialty in Accounting in 2011. Dean understands not only the technical side of how devices work together and integrate within an environment, but also understands and designs the environment from a business point of view for productivity. He strives to provide cost-savings, efficiency and practicality to solve the real issues that are present for each individual client he works with. Leveraging his 20+ years’ of enterprise-level experience, for the past ten years, Dean has consulted with numerous Fortune 500 companies across the country on issues relating to network infrastructure and security, Citrix XenDesktop, VMWare implementation and capacity planning, Office 365/Exchange Email Migrations as well as Mobile Device Management and Disaster Recovery Planning. He has also been engaged to develop and improve technology processes as well as accomplish technology projects on time and budget. Today, Dean uses all of these skills and more to aid small to medium-sized businesses to utilize technology to run their companies more profitably and efficiently. As Chief Technical Officer of Argentum IT, LLC for the past ten years, Dean has supervised a proactive service desk who educates clients on technology best practices, designed multiple infrastructure environments for clients (both big and small), to fit their needs and built a sizeable hosted infrastructure environment – including VMWare and Citrix “products”. Dean’s breadth of experience affords him a unique view of IT and business challenges, which allows him to help customize and develop unique solutions to solving IT and Cyber Security challenges.

Author's recent posts

More posts from author
Saturday, 28 June 2025 Fortify Your Business: A 4-Step Cybersecurity Action Plan
Wednesday, 25 June 2025 Stop Typing the Same Email Over and Over! Use Templates Instead
Monday, 23 June 2025 3 Scenarios That Could Cause Data Loss for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Wednesday, 25 June 2025

Captcha Image

Customer Login

Remember me
  • Forgot your password?
  • Create an account

News & Updates

On A Mission To Simplify IT, Dean Lause Turned His Parents IT Struggles Into Inspiration And Became The Premier IT Solution For Small and Medium Sized Businesses in Louisville, Kentucky

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Read More

Contact us

Learn more about what Argentum IT can do for your business.

(502) 473-6407

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.

Powered by JoomConnect
  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us