01858 4554260800 310 0056

We focus our articles for your business to help you better understand what IT solutions work best for you.

Published 25 November 2019

Adrian Fowler

Adrian Fowler
Managing Director

As a concerned business owner, you should have already asked your IT manager the question “Is our data secure, and are our devices protected against hacks and Cryptolocker Virus’s?”

If you have, are you happy with the reply?
Subscribe to receive useful IT articles relating to your business

Data Security – What most business owners don’t know and risk

As a business owner concerned about data security, you should have already asked your IT manager the question “Is our data secure, and are our devices protected against hacks and Cryptolocker Virus’s?”

The problem is, and despite being verbally reassured, you still don’t know for sure if you are – until of course you find out the costly way.

You know that just because you haven’t had a data breach doesn’t mean to say you won’t.

And just because you haven’t suffered the cost of losing your data and having to pay ransoms to get it back doesn’t mean to say that it won’t happen today, tomorrow or next week.

Data Security - Laptop displaying computer code

The problem is that most IT managers and under resourced IT service suppliers are not data security experts. They know very little about Firewall protection. In contrast, the cyber-criminals know a lot about Firewall protection – so the odds are in their favour. Challenged with compromising your Data who would you bet on?

Data Security – What should business owners do?

Just like fitting good locks on the doors and a burglar alarm to keep out the criminals, business owners need to secure their IT equipment from the outside world. Do this by installing a Unified Threat Management (UTM) device.

UTM devices are attractive for their simplicity. In the past organisations may have had individual vendors or appliances for each separate security task making them difficult to manage and much harder to integrate. This frequently left gaps in security when targeting blended threats, which are a combination of different types of malware and attacks that target separate parts of the network simultaneously.

By creating a single point of defence and providing a single console, UTM solutions make dealing with varied threats much easier.

What does a UTM device protect against?

A UTM device will usually include functions such as antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Stop these threats at the point of entry, and not inside your computer network.

The UTM devices come with a subscription enabling the device to be continually updated with the latest threats.

Advanced Threat Protection (ATP) service is a cloud component that consists of multiple sandboxing engines. Once enabled, whenever your UTM device runs across a file (encryption virus which may look like an innocent attachment) or process that the device is unsure about, that file is halted in place and transferred to a secure gateway. It is held there until cleared by the sandboxing process, failing that destroyed and never make it to your network.

Each device lets the rest know about new threats

Each UTM device around the world are linked through the cloud. As soon as any of them use the cloud-based sandboxes to reveal the presence of an unknown malware, a signature is created and shared with all the others. Suddenly, those extremely malicious zero-day attacks become known quantities to anyone with a connected UTM device running the ATP service.

Want to know for sure if you have reliable levels of data security?

Call Apograph on 01858 455426 and one of our team will happily discuss your IT security protection level, or email ask@apograph.com.


© Apograph Ltd | 2019. All rights reserved.

Share this post

This entry was posted in Uncategorised

© Apograph Ltd 1993 - 2022. All rights reserved v2018.1.0. Website designed, coded and hosted by Apograph Ltd.