Jellyfish for
Small to Medium Enterprises

About Jellyfish

Jellyfish is purpose-built to bring agility to large and small enterprises alike. Designed as an integrated, cohesive stack, Jellyfish can evolve with your security requirements. Each module can provide stand-alone support, addressing a single pain point, or integrate to create a secure cross-enterprise ecosystem.
Our modules are designed with emerging technology in mind to ensure our clients can future-proof their organisations against emerging threats.

10 Activities to Protect Small Business Information, Systems, and Networks

NIST recommends small business organisations take the following actions to improve the effectiveness and security of their information systems.

Read more here.

Protect Information, Systems and Networks From Damage By Viruses, Spyware, and Other Malicious Code

Small businesses should install antivirus and anti-spyware software on every computer used in their business operations. This needs to be updated regularly in accordance with vendor specifications.

Provide Security for Internet Connection

Small businesses are more exposed to threats than personal computers and networks. Businesses should install and keep operational a hardware firewall between their internal networks and the Internet. The firewall function may be provided by a wireless access point or router installed by the small business or by a router operated by the Internet Service Provider (ISP) of the small business.

Patch all Operating Systems and Applications

The vendors of major operating systems generally provide patches and updates to their products. These correct discovered security problems and improve functionality of the software. Patches should be applied to business systems regularly and installed on all new systems and software.

Make Backup Copies of Important Business Data and Information

Copies should be made of all data including word processing documents, electronic spreadsheets, databases, financial files, human resources files, accounts receivable and payable files, and other information used in or generated by the business. This will prevent loss of data when there are equipment failures, employee errors, or destruction of data by malicious code.

Secure Wireless Access Points and Networks

Small business owners who use wireless networking should set the wireless access point so that it does not broadcast its Service Set Identifier (SSID). When new devices are acquired, the administrative password that was on the device when it was purchased should be changed. Strong encryption should be used so that data being transmitted between the businesses’ computers and the wireless access point cannot be easily intercepted and read by electronic eavesdroppers.

Control Physical Access to Business Computers and Network Components

Unauthorised persons should not be allowed to access or to use any business computers, including laptops. Computers should not be available to access by cleaning crews or by unsupervised repair personnel. Employees working at their computers should position their displays so that they cannot be seen by people walking by an office or by unknown strangers who may walk into an office.

Require Individual Accounts for Each Employee Using Business Computers and Business Applications

A separate account should be established for each individual computer user, and strong passwords should be used. Passwords should be changed at least every three months. The employees’ individual accounts should not have access to administrative accounts to avoid the installation and spread of unauthorised software or malicious code.

Train Employees in Basic Security Principles

Employees should be trained to use the sensitive business information properly and to protect the business’ and its customer’s information. Employees should receive training on the organisation’s information security policies, including the use of computers, networks and Internet connections, the limitations on personal use of telephones, printers, and other business resources, and any restrictions on processing business data at home.

Limit Access to Data and Information By Employees, and Limit The Authority to Install Software

Access to all data and to all systems, including financial, personnel, inventory, and manufacturing, should not be provided to any one employee. Access to systems and data should be limited to the specific systems and information that employees need to do their jobs. One employee should not be allowed to both initiate and approve transactions, such as financial transactions.

The Problem

It is not possible for a small business to implement a perfect information security program, but it is possible (and reasonable) to implement sufficient enough security for information, systems, and networks that malicious individuals will go elsewhere to find an easier target.

Small businesses need to ensure they keep their software and systems up to date. For example, with regular patching. Additionally, staff must be educated about basic security steps. For example, not clicking email links from unknown sources, and good password management.

The Solution

Many small businesses will focus on firewalls, and traditional on-premises network boundaries, to keep malicious actors out. The problem with this approach is, once someone is inside your network most organisations have very few restrictions in place. This means bad actors could gain privileged access just by being in the network. Small businesses need to look at a layered approach to security. Authentication and encryption are essential components.

The boundary is still very important, but small businesses need to look at their “trophy data” – the data that if stolen, would impact them significantly – and implement security solutions that protect that data. Cogito Group’s Jellyfish® improves boundary protection. What we can do to mitigate threats inside the network is our differentiator.

The Results

Jellyfish provides a layered approach by combining a number of security modules to ease the burden of management.  Jellyfish’s automated processing reduces manual tasks and training costs. Jellyfish fills security gaps and feeds from one system to trigger an action in another.

99% Decrease in Vulnerability

32% Decrease in Manual Processes

60% Reduction in Training Costs

50% Increase in Productivity