• Complain

Denny Cherry - Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English

Here you can read online Denny Cherry - Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Apress, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Denny Cherry Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English
  • Book:
    Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies uponor should be employingin order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organizations biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the why of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office Who This Book Is For Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their business relies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement

Denny Cherry: author's other books


Who wrote Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English? Find out the surname, the name of the author of the book and a list of all author's works by series.

Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Enterprise-Grade IT Security for Small and Medium Businesses - photo 1
Book cover of Enterprise-Grade IT Security for Small and Medium Businesses
Denny Cherry
Enterprise-Grade IT Security for Small and Medium Businesses
Building Security Systems, in Plain English
Logo of the publisher Denny Cherry Denny Cherry Associates Consulting - photo 2
Logo of the publisher
Denny Cherry
Denny Cherry & Associates Consulting, LLC, Oceanside, CA, USA
ISBN 978-1-4842-8627-2 e-ISBN 978-1-4842-8628-9
https://doi.org/10.1007/978-1-4842-8628-9
Denny Cherry 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC, part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

Thank you to my wife, Kris, for putting up with my writing another book, which I know isnt her favorite activity for me to go through. And thank you to my team at Denny Cherry & Associates Consulting who reviewed the book as well as kept me on task with both the book and our client projects that were in flight at the same time.

Introduction

With Enterprise-Grade IT Security for Small and Medium Businesses, I wanted to take a different approach than most IT books. Most are written with the assumption that the reader knows what they should put in place, and they are a sort of how-to book on implementing the various solutions. With Enterprise-Grade IT Security for Small and Medium Businesses, the approach was instead taken to educate people who dont normally work hands-on with these various technologies. Thus, executives can have a good understanding of what technology solutions are available, and can ask questions of their IT teams as to why dont they have X, and do they need to have Y in place, while having an understanding of what these technology solutions are capable of doing.

In Chapter , well review why IT security matters and why companies need to have an IT security infrastructure in place. One of the big reasons why companies dont invest in IT security is because it is expensive, and often the company doesnt see the benefit to spending the money.

In Chapter , we will take a slightly more technical approach as we talk about network design decisions that companies can make for how their network is designed. These range from fairly wide open with all the devices on the network able to communicate with all the other devices, to a network that is segmented, preventing devices on the network from accessing other devices unless specific access is granted.

In Chapter , we will review what firewalls are, what they do, and why are they useful for companies to deploy to protect their network infrastructure. This will include the cloud options available in the three major clouds.

In Chapter , we will review denial of services and distributed denial of service attacks, and how they are prevented using distributed denial of service appliances. Well also compare and contrast these appliances with firewalls so that we can see when one is used versus the other. This will include the cloud options available in the three major clouds.

In Chapter , we will review the remote connectivity options that companies can make available to their users, including why they are good to have and the risks that these solutions introduce.

In Chapter , we will review the security options available within each of the major operating systems. This includes why the various platforms should be patched and upgraded frequently.

In Chapter , we will review what multi-factor authentication is, how it should be used, and when it should be used.

In Chapter , we will learn about zero trust environments and how companies can benefit from having such an environment in their network infrastructure.

In Chapter , we will talk about the weakest link in IT securitythe company staff. We will review the training that employees should be doing regularly, as well as what topics should be covered in that training.

In Chapter , we will continue on this theme of employee training to not only secure their company resources but also their daily life, as an attackers gaining access to personal resources can be leveraged to compromise the employees business life.

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub (https://github.com/Apress). For more detailed information, please visit http://www.apress.com/source-code.

Contents
Part I: The Infrastructure
Part II: The Computers
Part III: The People
About the Author
Denny Cherry
has been working in the information technology field for over 20 years and has - photo 3
has been working in the information technology field for over 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN magazine, and SQL Server magazine, as well as spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for over 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet rabbits, and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries, where he speaks at both small local events and large industry and corporate events.
About the Technical Reviewer
Paul Cretaro
is an information technology professional with over 25 years of industry - photo 4
is an information technology professional with over 25 years of industry experience, mostly concentrated in information security and team management. He has been CISSP certified for over 18 years and is an ISC2 subject matter expert for the CISSP exam. He has strong managerial skills with extensive training experience. Paul is an MCSE Windows expert, college-level trainer, and published author, with hands-on security lab manuals sold worldwide. Paul has also worked in the financial sector for 16 years, supporting information technology and security.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English»

Look at similar books to Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English»

Discussion, reviews of the book Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.