How Copper State Communications delivers a unique approach to security.
Security-wise, that is.
When decision-makers are looking at protecting their businesses, they have to really examine two things that go into the balance of security:
- what do you want to protect?
- who are you trying to protect?
Much of the time, our clients are trying to protect data from their own users in the sense that the data is loosely exposed or transmitted. Sometimes it is given to other external forces without the thoughts of, “Is this really the business’s intellectual property?” or “Have I given away too much?”
There must be a balance between protecting your business from hackers, and protecting it from its own users. There are multiple layers of defense that can apply to both issues. At Copper State Communications, we provide a unique security feature to insure our customers against breaches.
Everyone should have a firewall. The firewall is the guardian at the gate. And, once it’s installed, you should run it through external testing to make sure it’s set up properly and no one can walk through.
Then you need a malware defense agent because if an outside party makes it through the firewall, then the malware comes into play. Your malware agent is designed to do one thing: look at the data coming into your computer and see if it detects that it is a call-and-command piece of software. The call-and-command software is what will download the virus.
The problem is time
If the malware agent doesn’t get it, then the antivirus blocks the application from running — but that takes time. In that time, you could have files already encrypted. And who’s to say the antivirus will stop the malware from jumping to another machine?
While these layers — the firewall, malware agent, and antivirus — are all necessary parts of a security strategy, they can still miss infiltrators.
That’s where our smart approach to layered security comes in.
Most of the time, your antivirus and your firewall are two strong defenses that never talk to each other. We have a technology where the antivirus and the firewall communicate and create a strong bond. Once something is in, it can’t get out.
Allowing the communication between the firewall and the antivirus is a unique thing we do for our clients, and it allows the antivirus to tell the firewall it is having a problem. It will tell the firewall to disconnect it, and the firewall will isolate the client so that it can’t communicate with everyone. That gives the antivirus time to try to clean the virus. If successful, the firewall will allow access. If it can’t, the antivirus sends a signal saying it thinks it has a virus and can’t do it itself. Here’s where we’d step in to offer manual support.
Our technology traces the jumping of the virus to another machine. We track down how that virus is sent to another machine, we find the trail, and we go in and attack those machines individually instead of doing a day-long scan of every machine. This is a big advantage for a network administrator.
Interested in learning more about a comprehensive security strategy for your business? Register for our two-part webinar series, Cybersecurity: The Best Defense is a Good Offense, where I’ll be talking about these strategies and much more on September 20th and 27th at 11AM (AZ).