Home > Blog
Read Time — 4 minutes
Let’s take a quick trip back to medieval times. You’ve got your castle, complete with surrounding moat. You’ve got a thick, strong drawbridge that opens over the mote and closes, a completely encircling outer wall, and an army surrounding that outer wall to protect against any invasion. Plus, knights are close at hand to guard you personally. You are safe and fully protected, right?
No, you are not fully protected; it takes more than an army and walls and moats to safeguard the castle from threats. It’s the same with your software system and data---full protection requires a lot more than infrastructure alone; it requires constant testing of the security system and processes until they break.
Consider the following scenarios:
Now instead of picturing a castle, imagine that it’s your data that’s being attacked. In addition to a constant barrage of malware, viruses, and trojans, ransomware and even human error (we’ve all been fooled at least once, right?) leave data vulnerable.
Look at the following statistics:
Security is a constant battle and it’s no different for small businesses. Every time you forget to update virus protection, your employee clicks on a phishing email, or your employees use their personal devices for work purposes, you could be open to attack.
Where do you keep your data backup? How often do you back data up? An even better question is, how often do you test your back-up system? Have you tested your back-up system, or do you simply trust that in the event of a breach, you’ll be able to plug in your back-up system and it’ll upload everything in one quick, smooth step?
Here at ECI, we go beyond our infrastructure that includes multiple datacenters and our redundant and resilient approach; we protect ourselves and our customers in the following ways:
One of the key benefits of ECI's cloud, is that we're not just one business trying to protect itself. We bring the demand of all our customers to bear and that gives us the leverage and buying power to get the best security possible and the most attention from security providers in the event of an issue.
ECI has the layers of security, resiliency, economies of scale, and leverage to bring the solutions you need to your doorstep without an on-premise investment. This frees you up to focus on your core business.
In my next post, we’ll explore penetration testing and threat analysis, and how ECI proactively eliminates data vulnerabilities.
1Ponemon 2017 State of Cybersecurity in SMBs Report
2Symantec 2016 Internet Security Threat Report
3Verizon 2018 Data Breach Investigations Report