top of page

Welcome to Cyber Security Layers. Say What ??

In Canada we recommend that everyone wear Layers of various warm clothing in the winter time, to keep us warm and protected from the cold, when we play outside.

 

When we work and play on the internet we also need Layers to keep us safe from scammers, viruses and other potential trouble. This page provides some suggestions that Techywiz likes to use and provide to its clients to stay safe online.

Over the years I have spent many hours cleaning up some very unfortunate messes caused by cyber crime or cyber scams. Individuals that have been compromised due to weak passwords. And Individuals that have been compromised due to having zero protection. The clean up tasks that we need to go through to get people safe online again are 80% avoidable by having the correct layers of protection. The other 20% is simply education, and understanding the "Why" question. 

 

Most common realization or question I get - "Why Me?" 

​

The simple answer is - "You were likely an easy target" 

 

Don't be an easy target.

​

For the 20%, of Human Knowledge and Understanding factors  - please go to our Cybersecurity Info page and click on our government's free cyber security information pages.  Learn how to protect yourself from different types of scams. Learn how scams try to trick you with fake emails - Phishing Emails

​

​

​For the 80%  - I recommend you follow these minimum steps to safe online. 

​

​

Step 1  - Layer 1   - Additional Firewall or Router - We all have an Internet provider Modem / Router - this is a necessary piece of hardware to run the internet in your home.  I recommend an extra router or firewall on top of the provider device to protect you even further. This is something we can help with as well. 

 

Step 2 Layer 2   - Security Protection Suite (ESET) On your computers - Make sure you have an Antivirus or Security Suite of programs preforming more than just Antivirus functions. Your Antivirus program should handle Real-time protection for Surfing , For Email, and for Files and data on your computer.   It should have network protection, Secure banking browser protection, the ability to encrypt folders with sensitive data when needed and also the ability to encrypt removeable drives. Your data and your identity are big targets.  I recommend ESET because I have worked with many products that are ok, but not as good as ESET. ESET is light weight and is packed full of the features mentioned. And the annual cost is affordable. 

​

Step 3 - Layer 3  - Additional Security Tools Implemented by your IT Provider like Huntress Labs - Huntress Labs is a product and service that seeks out dormant stealth or timed malware that could infect your computer or send your data off to an internet server on the dark web. Huntress labs services with TechyWiz will add that extra layer of protection without bogging down your computer. 

​

Step 4 - Layer 4  - Dual Authentication or Multi-Factor Authentication (MFA)- So much of our interaction with online cloud services like Google, Microsoft , Facebook and others have implemented dual or muti-factor authentication. If you are not using MFA on every online account or service , you should seriously get on the bandwagon. I used hate the concept of another level of password entry but now that I have been through some pretty ugly and expensive data breaches with my clients, I am fan favourite.

​

There are many more in-dept layers of security that can be implemented, but the above 4 steps will definitely help to keep you safe online. 

​

My number 1 tip  - If you are ever in doubt about a strange email or an  email that looks legitimate  like it came from someone you know, but it doesn't look right, or asks you for something odd. Pickup the phone and verbally confirm. If you cannot call someone to confirm and you are still apprehensive about this email , then just delete it.  Its not worth your headache. If it is important enough, you will get a call or a proper letter in the snail mail.​​​​​​​​​​

Stay Safe online. Educate each other and share your knowledge with others.

cybersecurity more friendly.jpg
bottom of page