Book an Appointment

Y-Not Tech Services Logo
  • Home
  • About
  • Contact
  • Services
    • Done-For-You Busienss IT Services
    • Business Continuity and Disaster Recovery
    • Home Security Suite
    • Password Protector
    • All Services
  • Best Antivirus
  • Articles
    • Browse All
    • What Happens When You Interrupt a Windows Update? | Y-Not Tech Services – Lethbridge, AB Computer Help
    • Do You Know Exactly What is Being Backed Up on Your Computer? – Y-Not Tech Services | Lethbridge, AB IT Business
    • 6 Reasons to Replace Your ISP Email | Y-Not Tech Services – Lethbridge, AB Computer Help
    • 6 Uses for Your Old, Extra Computers | Y-Not Tech Services – Lethbridge, AB Computer Help
    • A Friend of Mine Was the Victim of Bank Fraud in Lethbridge, AB
    • Avoid Duplicating Passwords | Y-Not Tech Services – Lethbridge, AB Computer Repair
  • Testimonials
  • Hours
  • Remote

Cyber Security Awareness Month 2020: Protect Your Firm Against Zero-Day Attacks | Y-Not Tech Services – Lethbridge, AB IT Support

October 15, 2020 by Tony Whitney

Cyber Security Awareness Month 2020: Protect Your Firm Against Zero-Day Attacks | Y-Not Tech Services - Lethbridge, AB IT Support

Protect Your Firm Against Zero-Day Attacks

Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it?

A security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it.

A newly discovered attack might be packaged into a computer virus or worm. This will allow it to spread far and wide while inflicting the maximum amount of damage possible. When spread successfully, a new exploit has the potential to reach hundreds of thousands of computers before an operating system or anti-virus update can even be issued.

There are a number of ways we can protect your business or lessen the damage from a zero-day attack.

Preventative security

The number one way to mitigate the damage from any attack to your system is to prevent it from happening in the first place. Maintaining a good firewall and up-to-date antivirus is the best step you can take to ensure the security of your system.

A firewall, monitoring traffic in and out of your network, reduces unauthorised entry over the network. Even without knowing the exact nature of the attack, suspicious activity travelling in and out of the system can be stopped.

The same is true of modern Antivirus. Even when it can not identify the specific zero-day threat from its virus database; it can often identify malicious intent from learned behaviour in the system.

A Locked Down Network

Should a zero-day threat make it into your network, our next goal should be to limit its effects. By restricting user access to only essential files and systems we can limit the damage done to the smallest number of systems. Good security policy dictates that each account should only have full access to the systems needed to complete the user’s job. For example, users from the accounts department shouldn’t have access to sales department databases.

In this way, the damage of a single compromised account is limited to only the network area it operates in. Such limited impact should be easy to control and can be reversed with regular backups.

Good Data backup

Whether your entire network has been exploited or only a small area has been affected; good data backups are your protection against major lasting damage. Having a good backup means having the procedures in place to both create regular backup copies and make sure they can be restored at a later date.

Reliable and well-tested backups are worth their weight in gold. Knowing your data is safe and your system can be recovered is peace of mind against even the most highly destructive zero-day attacks.

Intrusion Protection

While the precise methods of a zero-day exploit can’t be known in advance, a network intrusion protection system (NIPS) can monitor the firms’ network for unusual activity.

The advantage of NIPS over a traditional antivirus only system is it does not rely on checking software against a known database of threats. This means it does not need updates or patches to learn about the latest attacks. NIPS works by monitoring the day-to-day patterns of network activity across the network.

When traffic or events far out of the ordinary are detected action can be taken to alert system administrators and lock down the firewall. Devices such as USB drives and mobile devices can all introduce threats to the network. They can often make it past the firewall because they are physically introduced to the system.

NIPS protects against threats introduced to the network from both external and internal sources.

Full Cover Protection

Used in combination these techniques can prevent, protect, and mitigate against the kinds of threats that even the top security firms haven’t patched yet. We think it’s important to keep your firm secure whatever it might come up against in the future.

If you could use help protect your business against online threats, book an appointment today:

Book an Appointment

 

Filed Under: Business IT, Cyber Security Month October 2020 Tagged With: becybersmart, Computer help, computer help lethbridge, computer repair, computer repair Lethbridge, cybersecurity, exploit, malware, ncsam, ransom, ransomware, Y-Not, y-not tech, ynot, ynot tech, zero-day

Share:

Services

  • Web Design and Hosting
  • Upgrade to Solid State Drive
  • Laptop Screen Replacement
  • Virus Removal and Tuneup
  • Software Installation
  • Remote Connection Tech Support for Canada
  • On Site Service
  • One on One Technology Training
  • Hardware Install
  • Computer Diagnostic

Testimonials

  • Tony is knowledgeable, friendly and efficient. Read More
    Bruce W.
  • Tony was great to do business with. He knew exactly what needed to be done even with the little amount of information I had about the project!!! Competitive pricing I will definitely call him again!! Read More
    Graham F.
  • Very friendly, personable and present when explaining what is going on with the computer, appreciated a good dialogue and helpfulness you provided! Read More
    Darlene B.
    Lethbridge, AB
  • Tony is the best IT computer guy I have ever used, he has fixed problems the big guys said I had to buy a new computer for and then I got him to set up internet stuff for the house...again awesome and someone I trust. (from google.com) Read More
    David Duggan
  • Y-Not Tech Services is a excellent tech company that answers all your questions regarding computer problems. Tony is completely honest in explaining options to deal with the problem, and then recommends the best option to use. His advice is based on not just his own consensus, but as well checks with other techs in his... Read More
    Derrick Boyko
    Coaldale, AB
  • Tony walked in to drop off a business card and when he walked out. 3 issues I had on my computer were gone and I had a new anti virus. Phenomenal service I would recommend him to anyone ! (from facebook.com/ynottechservices) Read More
    Ryan Brigham
    Big Al's Music and Games in Lethbridge, AB
  • I trust my tech guy! ... (it's Tony) best option if you don't watch your scans and security. Read More
    Kehly Rath
  • Will recommend to anybody. He is darn good. Read More
    Shima Raj
  • He is fast to respond and has always been able to walk me through any problem I have. I always rely on Tony for my tech needs. Read More
    Heather Arstall
  • Will always recommend the best product or service to fit your unique needs. Read More
    Bev Trahan
Get Your Free Ebook

FOLLOW US

Book an Appointment with us!

Book an Appointment

Copyright © 2025 · Y-Not Tech Services · 534 17 st S, Lethbridge, Alberta (AB) T1J 3C3