Blog Layout

Cyber Crime Fighters Unite Against “Leaving Your Keys in the Car"

Cyber Crime Fighters Unite Against “Leaving Your Keys in the Car"


Nils Desmet • Sep 02, 2018
Nils Desmet • Sep 02, 2018

We said it before, and we will say it again; Cyber Security is not an IT problem, it’s an EVERYONE problem. But problems are made to be solved, right? There are ways to keep your systems protected. One thing you should definitely do is always keep your systems up-to-date as well as run a current antivirus software on your PC.


There are a ton of good ones out there that can protect you, like ESET for example, we have been using their products for years for our business-owning clients, but they also have great stuff for home computers.


If you own or run a business, you can (and probably should) invest in a good hardware security appliance – notice how I didn’t say firewall. 


What’s the difference? 


Well, a firewall does one thing, block traffic based on a rule that is set to allow or block. A security appliance like the ones from our good friends at WatchGuard does many things besides acting as a firewall, making it far more effective in protecting you.


Think about it this way:


  • Car #1 is directly exposed to people passing it. It only has a padlock with a three digit code and the keys are in the ignition.

  • Car #2 is parked away from the street where the perimeter is fully fenced, there are cameras and two large dogs guarding it—it also has an alarm system.



For an average malicious person, Car #1 is not that hard to ‘borrow’ just as it is not that hard for cyber criminals to take down a system with only a firewall. Car #2, on the other hand, would be far harder to steal because even if you get past the fence there are many other things keeping it protected.


Similar to Car #2, a security appliance provides layers of protection which keeps cyber criminals at bay. Cyber criminals like low hanging fruit and there is plenty of it out there—just don’t be the one that gets picked by making it easy for the bad guys. It is naïve to assume everything is OK. Get the facts from your IT professional and, if needed, put simple things in place that are built to protect you.

You may also like

An envelope with a piece of paper and a red shield with a padlock on it.
By Nils Desmet 28 Mar, 2024
Learn the importance of DMARC in enhancing email security and how to implement it to protect against spam and phishing. It’s essential for businesses and email senders.
A screenshot of a web page with a list of next steps.
By Sarahi Miranda 13 Mar, 2024
Unlock the potential of Microsoft Loop with Makios Technology for seamless team collaboration and organization. Elevate your workflow effortlessly.
A dell desktop computer is sitting on a white surface.
By Ivan Flores 04 Mar, 2024
Discover the Dell Precision 3460 SFF, a powerful workstation designed for businesses. In our review, learn about its performance, design, and customization options.
a woman is holding a magnifying glass with the word scam on it.
By Nils Desmet 28 Feb, 2024
Protect yourself from scams and fraud with the help of Makios Technology. Learn how to identify potential scams and take legal action against them.
a telephone is sitting in front of a computer monitor
By Nils Desmet 13 Feb, 2024
Discover the key to success with our guide on creating and implementing a technology strategy that aligns with your business goals. Essential tips and steps are included.
a person is holding a cell phone in their hands in front of a laptop.
By Sarahi Miranda 06 Feb, 2024
Learn about the latest privacy and security features in iOS 17.3 for your iPhone. Keep your personal information safe and secure with these tips.
a man is sitting on the floor talking to a robot on a cell phone .
By Sarahi Miranda 26 Jan, 2024
Discover the top AI tools that businesses can leverage for efficiency, creativity, and gaining a competitive edge. Learn how to integrate these tools in 2024.
a person is holding a telephone next to a headset .
By Nils Desmet 16 Jan, 2024
See the advantages of Makios Cloud Phones with our comprehensive guide. Explore our models, their features, and the benefits they offer for optimal communication.
a man is standing in front of a computer monitor with an envelope with a red warning sign on it .
By Nils Desmet 10 Jan, 2024
Learn about spoofing, a common cybersecurity threat, and how to protect yourself and your organization from it. Contactus for more information.
a computer screen updating
By Nils Desmet 27 Dec, 2023
Explore the importance of software updates for system security through this comprehensive guide highlighting seven crucial reasons.
More Posts
Share by: