Enterprise-Grade IT Security for Small and Medium Businesses
Apress (Verlag)
978-1-4842-8627-2 (ISBN)
Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
You Will Learn
The importance of multi-factor authentication
The limits of what multi-factor authentication can protect
How firewalls are used to protect your company from attackers
What zero-trust environments are and what they mean
Whether zero-trust networks are what is needed to secure your own environment
The security benefits from implementing a network segmentation policy
The best ways to access files and resources from remote locations outside the office
Who This Book Is For
Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their businessrelies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement
Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for more than 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet bunny rabbits and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries where he speaks at both small local events as well as large industry and corporate events.
Introduction.- Part I. The Infrastructure.- 1. Why IT Security Matters.- 2. Network Design.- 3. Firewalls.- 4. Distributed Denial of Service.- 5. Remote Connectivity.- .- Part II. The Computers.- 6. Operating System Security.- 7. Multi-Factor Authentication.- 8. Zero Trust Environments.- Part III. The People.- 9. Protection Against the Weakest Security Link.- 10. Employee Training.
Erscheinungsdatum | 21.09.2022 |
---|---|
Zusatzinfo | 55 Illustrations, black and white; XII, 153 p. 55 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Wirtschaft ► Betriebswirtschaft / Management ► Allgemeines / Lexika | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Schlagworte | blacklists • Creating a Small Business Cybersecurity Program • Cybersecurity for Small and Midsize Businesses • Distributed Denial of Service Attacks • Employee Training • Firewalls • Multi-Factor Authentication (MFA) • Network Penetration • Network Segmentation • Remote Access Solutions • Remote Connectivity • The Cybersecurity Manager's Guide • The Essential Guide to Cybersecurity for SMBs • Virtual private network (VPN) • Whitelists • Zero Trust Environments |
ISBN-10 | 1-4842-8627-8 / 1484286278 |
ISBN-13 | 978-1-4842-8627-2 / 9781484286272 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich