Author:
Matthew Craig
Date:
January 18, 2021
Blog Image

If you are beginning your search for an IT service provider you may hear some talk about a security stack. Maybe something like this:

Our security stack protects endpoints at multiple layers by utilizing industry leading practices and NSA grade hardware that create a secure environment protecting you from today’s cyber threats.

NSA grade hardware...... that must be good ;)   but what exactly is a security stack?

I’m glad you asked. Keep reading to gain a better understanding.

In this article, we will be covering the basics and not so basics of what a security stack is without getting into the geeky details.

Security stack on a door - locks and signage

The Basics

A security stack is similar to house security in that it provides protection against different intrusion points/methods. Each intrusion point/method requires a different protection mechanism.

  • Intruder through door - door locks
  • intruder through window - glass breakage sensor
  • intruder opens a window - window open/close sensor

Security stacks consider all network infrastructure intrusion points/methods and bring together hardware, software, processes, and policies that guard against cyber threats.

For a clear understanding of cyber threats and steps you can take to stay safe; read our 4 part cyber security series

The not so Basics

If you’ve read through our 4 part cybersecurity series you know there are 3 main intrusion methods cybercriminals utilize to gain access to your data:

  • Password Guessing
  • Unpatched Systems
  • Social Engineering

To secure your infrastructure from these methods a security stack would implement all, some or more items in this list:

  • Anti-virus
  • DNS filtering
  • Email protection
  • Firewall
  • Data backup/recovery
  • Data encryption
  • Data access control
  • Security awareness training

Each one of these has a multitude of options for providing security. For this reason, no security stack is the same.

A security stack is not static:

As software companies change, new technologies come to market, and cybercriminals adjust to new opportunities; a security stack can also change over time.

THE END...

There is a lot that goes into creating and maintaining an effective security stack that isn’t covered here.

Let us know if you have any questions or comments about security over on our LinkedIn page. I’ve kept this article short and to the point as many of our readers don’t need/want a deep dive on this topic (unless they are having problems sleeping.... in which case let us know in the comments and I’ll help you out :)

logo
logo

You have a vision
we want to help you get there

Our approach to IT Service is unique. Let's see how we can best serve you!

Cyber Security

What is a ‘Security Stack’

A properly managed security stack will change over time as new technologies and new threats become prevalent. Read on to find out what a security stack is

|
January 18, 2021

If you are beginning your search for an IT service provider you may hear some talk about a security stack. Maybe something like this:

Our security stack protects endpoints at multiple layers by utilizing industry leading practices and NSA grade hardware that create a secure environment protecting you from today’s cyber threats.

NSA grade hardware...... that must be good ;)   but what exactly is a security stack?

I’m glad you asked. Keep reading to gain a better understanding.

In this article, we will be covering the basics and not so basics of what a security stack is without getting into the geeky details.

Security stack on a door - locks and signage

The Basics

A security stack is similar to house security in that it provides protection against different intrusion points/methods. Each intrusion point/method requires a different protection mechanism.

  • Intruder through door - door locks
  • intruder through window - glass breakage sensor
  • intruder opens a window - window open/close sensor

Security stacks consider all network infrastructure intrusion points/methods and bring together hardware, software, processes, and policies that guard against cyber threats.

For a clear understanding of cyber threats and steps you can take to stay safe; read our 4 part cyber security series

The not so Basics

If you’ve read through our 4 part cybersecurity series you know there are 3 main intrusion methods cybercriminals utilize to gain access to your data:

  • Password Guessing
  • Unpatched Systems
  • Social Engineering

To secure your infrastructure from these methods a security stack would implement all, some or more items in this list:

  • Anti-virus
  • DNS filtering
  • Email protection
  • Firewall
  • Data backup/recovery
  • Data encryption
  • Data access control
  • Security awareness training

Each one of these has a multitude of options for providing security. For this reason, no security stack is the same.

A security stack is not static:

As software companies change, new technologies come to market, and cybercriminals adjust to new opportunities; a security stack can also change over time.

THE END...

There is a lot that goes into creating and maintaining an effective security stack that isn’t covered here.

Let us know if you have any questions or comments about security over on our LinkedIn page. I’ve kept this article short and to the point as many of our readers don’t need/want a deep dive on this topic (unless they are having problems sleeping.... in which case let us know in the comments and I’ll help you out :)

Matthew worked with Agave IT Services as a Brand & Content Consultant through 2020. He managed our company transition from Agave Solutions Inc. to Agave IT Services (dba). From our Logo to our online presence and business operations platform; Matthew created a solid foundation able to support our growth into the future.

You can find
Matthew
on:
LinkedIn icon

Agave IT Services

We are an IT Services and technology company serving the southwestern United States since 2003. We specialize in supporting, managing, and deploying technologies for the AEC industries' unique requirements. We differ from the typical IT service provider in that we handle ALL your technology needs, freeing you to focus on your core business.

You have a vision
we want to help you get there

Our approach to IT Service is unique. Let's see how we can best serve you!
Yes Please!