Here’s a list of internet security tools for small companies. There are tools for backup storage, safe browsing, password management, network scanning, and combatting ransomware and distributed denial of service attacks.
Online Security Tools
Tor Project. Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all over the world. It prevents someone watching your Internet connection from understanding the websites you visit or your physical place, and it allows you to access sites which are blocked. Its free tools include a desktop browser and a proxy app for an Android apparatus.
Qualys FreeScan. Qualys FreeScan service can help you to safely and accurately scan your system for security threats and vulnerabilities. FreeScan is limited to 10 unique security scans of Internet accessible resources. FreeScan provides a comprehensive report which may be used to fix and fix security threats proactively.
Samurai Web Testing Framework. The Samurai Web Testing Framework is a virtual server, supported on VirtualBox and VMWare, that’s been pre-configured to be a internet penetration environment for analyzing applications.
Open Threat Exchange. Open Threat Exchange, hosted by AlienVault, is an open threat information community. It gives real-time, actionable advice for all participants. AlienVault also provides a free Reputation Monitor Alert, a service that alerts you if your public IPs and domain names appear in the threat exchange system, indicating they are compromised.
HTTPS Everywhere. HTTPS Everywhere is a Firefox, Chrome, and Opera extension which encrypts your communications with many significant sites, making your surfing more secure. HTTPS Everywhere is a collaboration between The Tor Project and the Electronic Frontier Foundation.
Electronic Frontier Foundation — HTTPS Everywhere
Social-Engineer. com. Social-Engineer. Com specializes in the science and art of social engineering. Social tactics are a growing trend in electronic security, in the types of malware, telephone elicitation, or impersonation. With Social-Engineer. Com, you can find out how to protect from an attack to influence and control people to obtain physical access or access to vital information.
DuckDuckGo. DuckDuckGo is an online search engine which does not store your search history or sell your information to advertisers which track you across the net. DuckDuckGo prevents personalized search results. Instead, it focuses on returning the best results, generated from countless individual sources, such as other search engines, such as Bing and Yahoo.
LastPass. LastPass is a password manager. As soon as you save a password in LastPass, you’ll always have it when you need it. When you are ready to generate a purchase, your profile will fill all of your payment and shipping details for you. The built-in password generator generates long, randomized passwords that protect against hacking. LastPass is free of charge, but also has a premium plan with encrypted file storage.
Ghostery. Ghostery is a browser extension that helps you handle website trackers for a safer experience. Ghostery finds and blocks monitoring technologies to accelerate page loads, remove clutter, and safeguard your data.
Comodo. Comodo One is a free remote monitoring and management, patch management, and service desk platform. Comodo also provides paid and free SSL certificates and an all-around innovative endpoint solution that runs all unknown files in a lightweight digital container where they can be used safely and tested automatically.
StaySafeOnline.org. StaySafeOnline.org is powered by the National Cyber Security Alliance. It supplies a list of free internet security checkup resources and tools to learn how to protect yourself online. Get useful resources from the N.C.S.A.’s sponsors and partners.
NSFocus. NSFocus protects infrastructure and customers from distributed denial of service attacks. Its products include Anti-DDoS System, Cloud DDoS Protection Service, and Threat Intelligence Subscription Service.
SpiderOak. SpiderOak is a storage service that’s focused on safety. SpiderOak safeguards your group messaging, file sharing, and file copies with end-to-end encryption to keep you protected from privacy intrusions, ransomware, and information reduction. Plans begin at $5 per month.
ProtonMail. ProtonMail is an email service designed around safety. All mails are secured automatically with end-to-end encryption. Because of this, your encrypted emails can’t be shared with third parties. No personal information is needed to make your secure email account. There are no IP logs which may be linked to a anonymous email account. ProtonMail offers apps for iOS and Android.
Threema. Threema is a safe messenger and may be used anonymously. Make end-to-end encrypted voice calls. Threema does not use a telephone number as unique identifier; rather, Threema problems a randomly generated ID.
OnionShare. OnionShare is an open source tool which lets you anonymously and securely share a file of any size. It operates by starting a web server, which makes it available as a Tor onion assistance, and creating an unguessable URL to access and download the documents. It doesn’t need a third-party file-sharing support.
CryptoStopper. CryptoStopper is ransomware detection software to prevent actively-running ransomware infections on Windows workstations and servers. CryptoStopper also provides free resources to simulate a ransomware assault on your system to discover if your are shielded. Plans begin at $1 per month per machine.
WatchPoint — CryptoStopper
Surveillance Self-Defense. Surveillance Self-Defense is a guide from Electronic Frontier Foundation to protect against electronic surveillance, for people all around the world. It features step-by-step tutorials for installing and using an assortment of privacy and security tools, but also aims to teach individuals how to think about internet privacy and safety even as the resources and adversaries change around them.
Random.org. This tool permits you to create random passwords. The passwords generated by this form are sent to your browser via SSL, and aren’t saved on the Random.org server.
Boxcryptor. Boxcryptor encrypts your sensitive files and folders in Dropbox, Google Drive, OneDrive, and several other cloud storages. It combines the advantages of the most user friendly cloud storage solutions with the maximum security standards worldwide. Encrypt your data directly in your device before syncing it to the cloud suppliers of your choice.
The Guardian Project. The Guardian Project creates secure apps, open-source software libraries, and customized mobile devices which could be used to protect communications and personal data from intrusion, interception, and tracking. Its apps include a mobile browser, chat messenger, and camera.
The Guardian Project
Tails OS. Tails is a live operating system that you could begin on just about any computer from a USB stick or a DVD. Use built-in and pre-configured cryptographic tools to encrypt your files, emails, instant messages, and much more.
On-line Entertainment scanners. Here is a helpful collection of anti-malware scanners, including VirSCAN, Jotti, Avast! , ThreatExpert, Eureka, and more.
Document shredders. Typically, your deleted files remain in your computer until the space is overwritten by something else. Document shredder programs overwrite files that are selected, so that they can never be retrieved. Here’s a listing of file shredders to eliminate your deleted files once and for all.
Cloudflare. Cloudflare Security Services protect and secure sites, applications, and APIs against denial-of-service strikes, customer information compromise, and violent bots.
Symantec Small Business. Symantec delivers a suite of solutions for small and midsize companies. Tools include SSL-TLS certificates, Norton Shopping Guarantee with free protection for internet shoppers, endpoint protection cloud, email protection, endpoint encryption, and a ghost solution suite.
Facebook Security Checkup. Use Facebook’s safety checkup to assess and add more security to your account. Learn how to protect your password, and receive alerts when someone attempts logging in to your account from an unrecognized personal computer or mobile device.
F.C.C. Cyber Planner. In the U.S. Federal Communications Commission, here is the little Biz Cyber Planner 2.0, an internet source to help small businesses create customized cyber security programs. Use this tool to create and save a personalized cyber security program for your organization, choosing from a menu of specialist advice to address your particular business needs and concerns. The F.C.C. also gives a cyber security tip sheet.