3 Myths about Cyber Security

1. My ISP Router Has A Firewall That Will Protect Me From Everything
Many people believe that the modem or router installed by your internet service provider is sufficient security to protect your network.
The truth is that your ISPs equipment does not allow for granular administration and control, and is often out of the control of the customer. A proper SOHO or business class firewall on the inside of the modem or router is highly recommended.
In fact, while a proper firewall is certainly necessary and will go a long way towards protecting your network from direct hacking, worms and probes, there are many other attack methods that will bypass it. Educating your employees and protecting your network on the inside is just as important.
2. My Free Antivirus Software Is Always Scanning & Protecting My PC>
Many people believe that the free antivirus program that they downloaded acts like a private detective, constantly digging through their computers files looking for viruses to keep them safe.
The truth is that typically only “pro versions” of such software do this. Free versions typically only scan files in active transfer – that is those being viewed in browser, downloaded or moved. Free anti-virus products tend to be reactive, not proactive, while only their professional version counterparts are capable for scheduled deep scanning. Some premium suites, also have more features, such as identity theft protection, firewalls, parental controls, and system performance tools. Another tradeoff is that free antivirus products often have some sort of advertisement for the company’s paid product.
3. My Backups Are Safe From Viruses
Many people believe that their backups are separate from their network, or that they are a protection from viruses.
The truth is that backups only copy what is already on your computer system. If the system is infected, the backup will be too. And restoring from that backup job will re-infect your computer. Furthermore, some backup solutions use external hard drives which, if mounted with a drive letter, are susceptible to the virus – meaning all your previous backups are vulnerable too. Best practices dictates that backups should be take regularly, retained for a sufficient period, and replicated offsite over the internet.