Key Topics Covered:

1. Internet Failover/Redundancy

  • Backup internet connection for business continuity
  • Security benefit of preventing employees from using unsecured hotspots

2. Endpoint Protection (EDR)

  • Modern replacement for traditional antivirus
  • Monitors behavior patterns vs. just known threats
  • Automatically isolates compromised machines

3. Microsoft 365 Security

  • Cloud monitoring for suspicious activities
  • Importance of backup solutions for cloud data
  • Recommendation to maintain security score above 60

4. Firewalls

  • Next-gen firewalls required vs. basic routers
  • Network segmentation capabilities
  • Regular subscription updates needed

5. Security Updates/Patch Management

  • Windows 10 end-of-life in October 2025
  • Importance of automated patch management
  • Need to plan hardware upgrades for Windows 11

6. Hardware Asset Management

  • Inventory of all network devices
  • Mobile device management considerations
  • Equipment lifecycle planning

7. Encryption

  • Required for mobile devices with sensitive data
  • Importance of secure key management
  • Recommendation to use BitLocker

Upcoming Episodes:

  • Part 2: Protecting Data
  • Part 3: Protecting People (including MFA and training)
  • Part 4: Interview with breach victim

NOTE: while these are baseline best practices, implementation should be handled by qualified IT professionals rather than DIY approaches.