Denny Cherry
Enterprise-Grade IT Security for Small and Medium Businesses
Building Security Systems, in Plain English
Logo of the publisher
Denny Cherry
Denny Cherry & Associates Consulting, LLC, Oceanside, CA, USA
ISBN 978-1-4842-8627-2 e-ISBN 978-1-4842-8628-9
https://doi.org/10.1007/978-1-4842-8628-9
Denny Cherry 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This Apress imprint is published by the registered company APress Media, LLC, part of Springer Nature.
The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.
Thank you to my wife, Kris, for putting up with my writing another book, which I know isnt her favorite activity for me to go through. And thank you to my team at Denny Cherry & Associates Consulting who reviewed the book as well as kept me on task with both the book and our client projects that were in flight at the same time.
Introduction
With Enterprise-Grade IT Security for Small and Medium Businesses, I wanted to take a different approach than most IT books. Most are written with the assumption that the reader knows what they should put in place, and they are a sort of how-to book on implementing the various solutions. With Enterprise-Grade IT Security for Small and Medium Businesses, the approach was instead taken to educate people who dont normally work hands-on with these various technologies. Thus, executives can have a good understanding of what technology solutions are available, and can ask questions of their IT teams as to why dont they have X, and do they need to have Y in place, while having an understanding of what these technology solutions are capable of doing.
In Chapter , well review why IT security matters and why companies need to have an IT security infrastructure in place. One of the big reasons why companies dont invest in IT security is because it is expensive, and often the company doesnt see the benefit to spending the money.
In Chapter , we will take a slightly more technical approach as we talk about network design decisions that companies can make for how their network is designed. These range from fairly wide open with all the devices on the network able to communicate with all the other devices, to a network that is segmented, preventing devices on the network from accessing other devices unless specific access is granted.
In Chapter , we will review what firewalls are, what they do, and why are they useful for companies to deploy to protect their network infrastructure. This will include the cloud options available in the three major clouds.
In Chapter , we will review denial of services and distributed denial of service attacks, and how they are prevented using distributed denial of service appliances. Well also compare and contrast these appliances with firewalls so that we can see when one is used versus the other. This will include the cloud options available in the three major clouds.
In Chapter , we will review the remote connectivity options that companies can make available to their users, including why they are good to have and the risks that these solutions introduce.
In Chapter , we will review the security options available within each of the major operating systems. This includes why the various platforms should be patched and upgraded frequently.
In Chapter , we will review what multi-factor authentication is, how it should be used, and when it should be used.
In Chapter , we will learn about zero trust environments and how companies can benefit from having such an environment in their network infrastructure.
In Chapter , we will talk about the weakest link in IT securitythe company staff. We will review the training that employees should be doing regularly, as well as what topics should be covered in that training.
In Chapter , we will continue on this theme of employee training to not only secure their company resources but also their daily life, as an attackers gaining access to personal resources can be leveraged to compromise the employees business life.
Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub (https://github.com/Apress). For more detailed information, please visit http://www.apress.com/source-code.
Contents
Part I: The Infrastructure
Part II: The Computers
Part III: The People
About the Author
Denny Cherry
has been working in the information technology field for over 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN magazine, and SQL Server magazine, as well as spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for over 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet rabbits, and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries, where he speaks at both small local events and large industry and corporate events.
About the Technical Reviewer
Paul Cretaro
is an information technology professional with over 25 years of industry experience, mostly concentrated in information security and team management. He has been CISSP certified for over 18 years and is an ISC2 subject matter expert for the CISSP exam. He has strong managerial skills with extensive training experience. Paul is an MCSE Windows expert, college-level trainer, and published author, with hands-on security lab manuals sold worldwide. Paul has also worked in the financial sector for 16 years, supporting information technology and security.