{"id":1042,"date":"2019-06-26T15:12:00","date_gmt":"2019-06-26T19:12:00","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/"},"modified":"2022-03-02T08:48:03","modified_gmt":"2022-03-02T13:48:03","slug":"why-is-4-not-enough-in-cybersecurity-think-44","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/","title":{"rendered":"Why is 4 not enough in cybersecurity?  Think 4+4"},"content":{"rendered":"<p>By Rick Kenney, VP &amp; Co-Founder TechSolutions, Inc<\/p>\n<p>Almost every company that was breached by a cybercriminal and had their data compromised over the last 18 months probably thought they were protected. They thought that everything was fine because they had a firewall, antivirus software, current Windows Updates, and a server backup solution. Just several years ago, this was considered sufficient for cybersecurity protection. Today, these 4 tools are not enough.<\/p>\n<p>Cybercriminals have figured out how to work around a security system that was once good enough. They are more motivated, more sophisticated, and more equipped to break into a company\u2019s network using new and innovative techniques. Once successful, cybercriminals take the valuable stolen data and try to sell it on the dark web.<\/p>\n<p>We are working with many of our clients to do more. Over the last year or so, we have added 4 new tools to protect a business using more of a layered approach. These new tools add further protections for your data, and they are managed by TechSolutions to empower the office manager in new ways.<\/p>\n<ul>\n<li><strong>Breach Detection:<\/strong> Endpoint agents are on the lookout for the bad guys based on behavioral analysis of active applications in your environment. These would be programs that were undetected by any of your other defense layers such as antivirus software.<\/li>\n<li><strong>Web Filtering:<\/strong> DNS and URL control for an overall safer computing environment. This is real-time protection against known malicious threats, unauthorized network access, and inappropriate websites that dramatically improve visibility &amp; control over internet and browser usage.<\/li>\n<li><strong>Security Policy Management:<\/strong> Effectively guards against threats by consistently implementing electronic security policies that the office manager can selectively tighten.<\/li>\n<li><strong>Dark Web Monitoring:<\/strong> Constantly searches for info that has been made available for use by the bad guys because of a breach incident outside of your control.<\/li>\n<\/ul>\n<p>We believe 4+4 = a much-improved security approach. These four additional security tools bundled together are called PointProtect\u2122. We believe PointProtect\u2122 will help keep your company\u2019s data and intellectual property, not to mention your clients\u2019 confidential information, better protected compared to 4+0.<\/p>\n<p>Talk to us about these exciting new Cybersecurity options.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Rick Kenney, VP &amp; Co-Founder TechSolutions, Inc Almost every company that was breached by a cybercriminal and had their data compromised over the last 18 months probably thought they were protected. They thought that everything was fine because they had a firewall, antivirus software, current Windows Updates, and a server backup solution. Just several [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[903],"tags":[],"class_list":["post-1042","post","type-post","status-publish","format-standard","hentry","category-articlebusinessbusiness-continuitysecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why is 4 not enough in cybersecurity? Think 4+4<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is 4 not enough in cybersecurity? Think 4+4\" \/>\n<meta property=\"og:description\" content=\"By Rick Kenney, VP &amp; Co-Founder TechSolutions, Inc Almost every company that was breached by a cybercriminal and had their data compromised over the last 18 months probably thought they were protected. They thought that everything was fine because they had a firewall, antivirus software, current Windows Updates, and a server backup solution. Just several [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-26T19:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:48:03+00:00\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Why is 4 not enough in cybersecurity? Think 4+4\",\"datePublished\":\"2019-06-26T19:12:00+00:00\",\"dateModified\":\"2022-03-02T13:48:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\"},\"wordCount\":358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"articleSection\":[\"article|Business|Business Continuity|Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\",\"name\":\"Why is 4 not enough in cybersecurity? Think 4+4\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"datePublished\":\"2019-06-26T19:12:00+00:00\",\"dateModified\":\"2022-03-02T13:48:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why is 4 not enough in cybersecurity? Think 4+4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why is 4 not enough in cybersecurity? Think 4+4","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Why is 4 not enough in cybersecurity? Think 4+4","og_description":"By Rick Kenney, VP &amp; Co-Founder TechSolutions, Inc Almost every company that was breached by a cybercriminal and had their data compromised over the last 18 months probably thought they were protected. They thought that everything was fine because they had a firewall, antivirus software, current Windows Updates, and a server backup solution. Just several [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2019-06-26T19:12:00+00:00","article_modified_time":"2022-03-02T13:48:03+00:00","author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Why is 4 not enough in cybersecurity? Think 4+4","datePublished":"2019-06-26T19:12:00+00:00","dateModified":"2022-03-02T13:48:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/"},"wordCount":358,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"articleSection":["article|Business|Business Continuity|Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/","name":"Why is 4 not enough in cybersecurity? Think 4+4","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"datePublished":"2019-06-26T19:12:00+00:00","dateModified":"2022-03-02T13:48:03+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/why-is-4-not-enough-in-cybersecurity-think-44\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Why is 4 not enough in cybersecurity? Think 4+4"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1042"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1042"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1042\/revisions"}],"predecessor-version":[{"id":4147,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1042\/revisions\/4147"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}