Email and Web Security: Are your IT systems protected by more than one layer of security? Relying on a singular cyber security system is a huge vulnerability and opens up your network to harm and risk. Defence in Depth (DiD) is a cyber security strategy that uses multiple layers of security to protect a business’s critical assets and IT systems. Moving to this layered approach is effective as it secures all attack surfaces. Even if a malicious actor gets through one layer of defence with a novel attack method, they are likely to be stopped by a further layer of defence.
Comprehensive email security
The first layer of defence is email and web security. This layer is extremely important with 90% of IT professionals stating phishing emails as their number one concern. Thankfully, if a business has a comprehensive email and web security solution, they significantly decrease their chance of having their data breached.
All businesses should have their email set up correctly. This includes the use of authentication records, including DMARC, DKIM and SPF. Whilst these are simple controls, they can prevent the majority of low-effort spray-and-pray phishing attacks. Therefore, there is no excuse why all businesses should not have them implemented.
Within this layer, businesses also need a dedicated email security solution. Most comprehensive email security solutions use AI to detect any potentially malicious emails and quarantine them before they even reach an employee’s inbox. It is also important to have internal email protection, which can prevent the lateral spread of attacks if an account is compromised.
Web security solutions
Closely related to email security in this layer is web security. A web security solution will not only protect against malicious URLs and websites but also enforce acceptable web use and mitigate shadow IT risks through uncontrolled cloud application risks.
This first layer will prevent most low-effort attacks. However, if a threat does manage to penetrate this layer, there are 5 more to stop it from reaching a business’s critical assets.
Further cyber security layers
Register your details below to receive part two ‘Layer 2: Perimeter Security’ straight to your inbox.