LEADER 03894nam 22005295 450 001 9910595057603321 005 20230831195247.0 010 $a1-4842-8628-6 024 7 $a10.1007/978-1-4842-8628-9 035 $a(MiAaPQ)EBC7097847 035 $a(Au-PeEL)EBL7097847 035 $a(CKB)24866015900041 035 $a(NjHacI)9924866015900041 035 $a(OCoLC)1345589445 035 $a(OCoLC-P)1345589445 035 $a(CaSebORM)9781484286289 035 $a(DE-He213)978-1-4842-8628-9 035 $a(PPN)264961242 035 $a(EXLCZ)9924866015900041 100 $a20220916d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEnterprise-Grade IT Security for Small and Medium Businesses $eBuilding Security Systems, in Plain English /$fby Denny Cherry 205 $a1st ed. 2022. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2022. 215 $a1 online resource (153 pages) 300 $aIncludes index. 311 08$aPrint version: Cherry, Denny Enterprise-Grade IT Security for Small and Medium Businesses Berkeley, CA : Apress L. P.,c2022 9781484286272 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training. 330 $aUnderstand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon?or should be employing?in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization?s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the ?why? of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office. 606 $aSmall business$xComputer networks$xSecurity measures 606 $aBusiness enterprises$xComputer networks$xSecurity measures 615 0$aSmall business$xComputer networks$xSecurity measures. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 676 $a260 700 $aCherry$b Denny$0940285 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910595057603321 996 $aEnterprise-Grade IT Security for Small and Medium Businesses$92915831 997 $aUNINA