Key Topics Covered:
1. Internet Failover/Redundancy
- Backup internet connection for business continuity
- Security benefit of preventing employees from using unsecured hotspots
2. Endpoint Protection (EDR)
- Modern replacement for traditional antivirus
- Monitors behavior patterns vs. just known threats
- Automatically isolates compromised machines
3. Microsoft 365 Security
- Cloud monitoring for suspicious activities
- Importance of backup solutions for cloud data
- Recommendation to maintain security score above 60
4. Firewalls
- Next-gen firewalls required vs. basic routers
- Network segmentation capabilities
- Regular subscription updates needed
5. Security Updates/Patch Management
- Windows 10 end-of-life in October 2025
- Importance of automated patch management
- Need to plan hardware upgrades for Windows 11
6. Hardware Asset Management
- Inventory of all network devices
- Mobile device management considerations
- Equipment lifecycle planning
7. Encryption
- Required for mobile devices with sensitive data
- Importance of secure key management
- Recommendation to use BitLocker
Upcoming Episodes:
- Part 2: Protecting Data
- Part 3: Protecting People (including MFA and training)
- Part 4: Interview with breach victim
NOTE: while these are baseline best practices, implementation should be handled by qualified IT professionals rather than DIY approaches.