{"id":830,"date":"2021-02-22T02:14:54","date_gmt":"2021-02-22T07:14:54","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/"},"modified":"2022-03-02T08:43:45","modified_gmt":"2022-03-02T13:43:45","slug":"cybersecurity-is-like-a-layer-cake","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/","title":{"rendered":"Cybersecurity Is Like a Layer Cake"},"content":{"rendered":"<p>By Rich Kenney<\/p>\n<p>Cybersecurity is difficult to manage because way too often, your local IT professional makes it confusing.  The so-called \u201cexperts\u201d speak in jargon, and they try to scare you.  Let\u2019s try something very different by putting it in these words:  Cybersecurity is like a layer cake. <\/p>\n<p>For many years, cybersecurity was almost intuitive.  You needed a <strong>firewall<\/strong> to guard your network, keep unwanted people out, and keep your data safe. Your IT provider also reminded you that you had to stay current with <strong>Windows Updates<\/strong> and <strong>antivirus software<\/strong>; then, because people forget, they automated this for you.  Finally, it made perfect sense that if bad things happened, you needed to be able to recover your files.  A <strong>disaster recovery \/ backup solution<\/strong> was added to your cyberdefense plan.  That approach worked for many years. <\/p>\n<p>Then things changed.  We began to depend on our computer systems to store sensitive data, credit card info, health and patient records, and intellectual property.  Then, the criminals created an entire industry out of breaching your systems and stealing your data.  Foreign countries, organized crime units, competitors, and other bad guys accessed and stole valuable data.  Even former employees began stealing records or files to help themselves or embarrass your business. <\/p>\n<p>So what does a business need to protect itself?  That\u2019s where it starts to get more complex.  At TechSolutions, we have a very different way to approach Cybersecurity.<\/p>\n<p>Cybersecurity is now about layers of protection.   Hikers and mountain climbers wear lots of layers of thin clothing to stay warm.  The earth is composed of lots of layers starting from our atmosphere all the way down to the planet\u2019s core.  And a layer cake reminds us all that the more layers you have, the better. <\/p>\n<p>Cybersecurity is no longer a simple sheet cake.  Today, it can be represented by a multi-layer dessert comprised of many flavors of moist cake, icing, special fillings, toppings, and don\u2019t forget the cherry on top.  The more important the occasion, the more layers in the cake.   <\/p>\n<p>Thinking in terms of cybersecurity, picture a layer that identifies threats that go past your firewall. Then, a layer that prohibits computer users from accessing known threats. Then, yet another layer that helps guard against inside threats.  Think about monitoring for your company\u2019s data appearing on the dark web; and what about training your staff to spot malicious emails and ransomware; having to confirm your identity in more than 1 way.  The list of different layers goes on and on.<\/p>\n<p>There are now layers of protections that use Artificial Intelligence to identify out-of-the-ordinary computer events and react accordingly.  There are protection mechanisms built into Microsoft 365 that are available, but you need to know how to turn them on.  Many firms even track every single action that occurs on the network to identify what was accessed or stolen if a breach actually does happen. <\/p>\n<p>Each layer of the cake provides something special for protecting your IT environment.  The more layers you have, the more incredible the cake.  The more layers the hiker has, the more they can adjust to different situations over the course of a long day on the trail.  Put simply, you need to work with an IT company that will implement a variety of cybersecurity layers to protect you effectively and efficiently. <\/p>\n<p>The three-layer cybersecurity plan is no longer enough to protect a company worried about their reputation and their bottom line.  <strong>If you have not improved your cybersecurity strategy in the past year or so, your current IT vendor is simply NOT doing its job.<\/strong><\/p>\n<p>Today, you need to add more cybersecurity layers because everyone now knows \u2026  <\/p>\n<p>\u2026 the more layers of protection, the better.  <\/p>\n<p>Expect more from your IT provider!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Rich Kenney Cybersecurity is difficult to manage because way too often, your local IT professional makes it confusing. The so-called \u201cexperts\u201d speak in jargon, and they try to scare you. Let\u2019s try something very different by putting it in these words: Cybersecurity is like a layer cake. For many years, cybersecurity was almost intuitive. [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-830","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Is Like a Layer Cake<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Is Like a Layer Cake\" \/>\n<meta property=\"og:description\" content=\"By Rich Kenney Cybersecurity is difficult to manage because way too often, your local IT professional makes it confusing. The so-called \u201cexperts\u201d speak in jargon, and they try to scare you. Let\u2019s try something very different by putting it in these words: Cybersecurity is like a layer cake. For many years, cybersecurity was almost intuitive. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-22T07:14:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:43:45+00:00\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Cybersecurity Is Like a Layer Cake\",\"datePublished\":\"2021-02-22T07:14:54+00:00\",\"dateModified\":\"2022-03-02T13:43:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\",\"name\":\"Cybersecurity Is Like a Layer Cake\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"datePublished\":\"2021-02-22T07:14:54+00:00\",\"dateModified\":\"2022-03-02T13:43:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Is Like a Layer Cake\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Is Like a Layer Cake","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Is Like a Layer Cake","og_description":"By Rich Kenney Cybersecurity is difficult to manage because way too often, your local IT professional makes it confusing. The so-called \u201cexperts\u201d speak in jargon, and they try to scare you. Let\u2019s try something very different by putting it in these words: Cybersecurity is like a layer cake. For many years, cybersecurity was almost intuitive. [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2021-02-22T07:14:54+00:00","article_modified_time":"2022-03-02T13:43:45+00:00","author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Cybersecurity Is Like a Layer Cake","datePublished":"2021-02-22T07:14:54+00:00","dateModified":"2022-03-02T13:43:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/","name":"Cybersecurity Is Like a Layer Cake","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"datePublished":"2021-02-22T07:14:54+00:00","dateModified":"2022-03-02T13:43:45+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cybersecurity-is-like-a-layer-cake\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Is Like a Layer Cake"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/830"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=830"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/830\/revisions"}],"predecessor-version":[{"id":3786,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/830\/revisions\/3786"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}