· Car #1 is directly exposed to people passing it. It only has a padlock with a three digit code and the keys are in the ignition.
· Car #2 is parked away from the street where the perimeter is fully fenced, there are cameras and two large dogs guarding it—it also has an alarm system.For an average malicious person, Car #1 is not that hard to ‘borrow’ just as it is not that hard for cyber criminals to take down a system with only a firewall. Car #2, on the other hand, would be far harder to steal because even if you get past the fence there are many other things keeping it protected.
Similar to Car #2, a security appliance provides layers of protection which keeps cyber criminals at bay. Cyber criminals like low hanging fruit and there is plenty of it out there—just don’t be the one that gets picked by making it easy for the bad guys. It is naïve to assume everything is OK. Get the facts from your IT professional and, if needed, put simple things in place that are built to protect you.