Air Gap

9th December 2019 | Cybrary Air Gap

air gap cybrary

An air gap is a security measure in which computers, computer systems, or networks are not connected in any way to any other devices or networks. It’s used in instances requiring airtight security without the risk of compromise or disaster. The term “air gap” is a merely metaphoric description of the conceptual gap required by the physical separation between the computers. Air-gapped networks and computers are used when maximum security of that system or the data stored in it must be ensured. Air gaps protect systems from malware, keyloggers, ransomware or other unwanted accesses.

What Does This Mean For An SMB?

Your business needs to take proactive measures today to first reduce its chances of being hit by ransomware, phishing, or other cybersecurity attacks. Secondly, validate backups and disaster recovery plans are current and functioning in case you end up hit with ransomware. CyberHoot recommends the following best practices to avoid, prepare for, and prevent damage from these attacks:

Start building your robust, defense-in-depth cybersecurity plan at CyberHoot.

To learn more about this topic, watch this short informational video:

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more