Company Cyber-Security

Company Cyber-Security

Cyber-security protocol which is effective in protecting businesses from malicious intent comes in many shapes and formats. Below is a list of things to keep in mind when managing a business in the 2020s.

  • Physical Security
    • Including badging and facilities access
    • Entry point Alarms (ie. Doors, windows, vents)
    • Cameras
  • Compliance and Regulation Standards
    • GDPR
    • HIPPA
    • COPPA
    • ADA
    • SOC 2
    • ISO27001
  • Cyber-security
    • Networks
      • Firewalls
      • VPN
      • Proxies
    • Systems
      • Servers
      • Desktops, Laptops
      • Mobile
    • Software
      • Antivirus
      • Remote Access
      • 2 Factor Authentication
      • Password management
      • Web content filtering
      • Email filtering
      • Intrusion Detection
    • Website & Application
      • SSL
      • Malware detection / Firewalls
      • Secure code writing
  • Managed Security
    • Threat identification
    • Security Logs
    • Desktop support
About Author

Tristan Poulsen

Tristan started his first tech company in 2011. Building websites, setting up cyber-security infrastructure, installing and configuring networks. Tristan is our Principal Consultant - helping customers meet their technology goals.

Esimplicity Technologies