Jellyfish for Small to Medium Enterprises
Jellyfish is purpose-built to bring agility to large and small enterprises alike. Designed as an integrated, cohesive stack, Jellyfish can evolve with your security requirements. Each module can provide stand-alone support, addressing a single pain point, or integrate to create a secure cross-enterprise ecosystem.
Our modules are designed with emerging technology in mind to ensure our clients can future-proof their organisations against emerging threats.
How Jellyfish can make a difference in your organisation
The cyber security fundamentals for small business owners are outlined below. Information has been gathered from research undertaken by the National Institute of Standards and Technology (NIST).
Division: Computer Security Division
Author: Shirley Radack
Ten Essential Activities to Protect Small Business Information, Systems and Networks
NIST recommends small business organisations take the following actions to improve the effectiveness and security of their information systems:
It is not possible for a small business to implement a perfect information security program, but it is possible (and reasonable) to implement sufficient enough security for information, systems, and networks that malicious individuals will go elsewhere to find an easier target.
Small businesses need to ensure they keep their software and systems up-to-date. For example, with regular patching. Additionally, staff must be educated about basic security steps. For example, not clicking email links from unknown sources, and good password management.
Many small businesses will focus on firewalls, and traditional on-premise network boundaries, to keep malicious actors out. The problem with this approach is, once someone is inside your network most organisations have very few restrictions in place. This means bad actors could gain privileged access just by being in the network. Small businesses need to look at a layered approach to security. Authentication and encryption are essential components. The boundary is still very important, but small businesses need to look at their “trophy data” – the data that if stolen, would impact them significantly – and implement security solutions that protect that data. Cogito Group’s Jellyfish® improves boundary protection. What we can do to mitigate threats inside the network is our differentiator.
WANT TO LEARN MORE ABOUT JELLYFISH?
1800 COGITO (264486)
or +61 2 6140 4494
0800 COGITO (264486)
or +64 4909 7580
Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington