There is no silver bullet, no panacea when it comes to thwarting Phishing and Spear Phishing!

There are many strategies, methods, tools, techniques, policies and procedures that can
create an effective layered defense protocol to prevent most Phishing attacks. It’s takes time,
patience, persistence, training and proper execution.

Morphing your computing systems environment into a more secure posture, will require you investingSecurity Compliance Checklist
a reasonable amount of time and some money. Even if you are a small Dental, Medical or Professional
office, you can get good protection without draining you of your financial resources. On the contrary, if
you fail to take action to protect the privacy, security and compliance of your most precious business
resources; your Patients, or Clients, the cyber criminals may well drain your accounts, exploit the
identities of your customers, and ruin your business.

Security is a culture, attitude and a choice, not solely a technically centered focus.

Layered approach to security includes these elements

  • Outside in
    • Firewall – blocking executable files
    • Advanced Anti-malware endpoints
    • Intrusion Detection / Prevention
    • Spam Filtering
  • Inside out
  • Controls
    • Strong passwords
    • Password manger
    • Minimum access required
    • Two Factor Authentication

Leave a Comment