Looking for our support portal?

Support Portal

Browse the blog

Case studies, answers to common industry questions, and more

Protect Your Business with a Multi-Layer Security Approach

Do you spend a lot of time worrying about keeping your organization safe from cyber attacks? We get it—with a constantly changing threat landscape and hackers who are relentless in their attempts, it’s hard to keep up.

The best way to prevent cyber attacks is with a multi-layer approach to security. This means purchasing multiple products and services to cover as many different angles as possible.

Here are our suggestions for a bare-minimum first layer, strong second layer, and third layer of protection.

First Layer

Firewall with Intrusion Prevention Services

Like traditional firewalls, these next-generation models include access control, but they also support Intrusion Prevention Services that analyze every packet entering your network and block the harmful ones.

Cloud DNS Protection

Cloud DNS protection blocks users from accessing malicious websites. This is a valuable weapon against phishing attempts.

Endpoint Security on your desktops

Endpoint protection software is more than antivirus software that just scans your files periodically. It should be able to look at all of your systems and provide you with the data you need to pinpoint and isolate threats.

Second Layer

Multi-Factor Authentication

Multi-factor authentication strengthens the user login process. One example is a smartphone app that sends a push notification with a code to verify your login credentials.

Email Security

More than 90% of security breaches begin with email, so supplementing 0ffice 365's built-in security with a 3rd party solution is an important layer of protection against phishing, malware, and ransomware.

Dedicated Security Engineer or Managed Security Provider

All of these security layers require someone to manage them. You can implement a web portal to correlate alerts from various security software, allowing you to see and react in one place. Or you can outsource your security management to a company that specializes in this.

Third Layer

Cyber Security Insurance

Security breaches are expensive. The costs of remediation, data restoration, and potential lawsuits add up quickly. Cyber security insurance helps cover these costs.  

Managed Detection and Response Services

This service supplements the need for an in-house security analyst, allowing you to outsource the day-to-day responsibilities of reviewing and remediating security alerts.

Threat Awareness Training for your users

This is a security layer that is often overlooked but easy to remedy. Training your users to identify potential threats can be a powerful way to safeguard against attacks. There are great online platforms for security training—at Telcion we adopted Knowbe4.

Take a Proactive Approach to Security

These are the building blocks to creating a multi-layered security approach that will provide the maximum protection available for your business.

The main issue we find with most of our clients is that they simply do nothing.

Or, they buy some products thinking that will protect them, but make no effort in managing these products and following through on the alerts they provide.   

You simply can't take a backseat approach to security. You must be determined to do everything you can to protect yourself, otherwise you are setting yourself up for failure.  

No matter where you are in your security life cycle, Telcion can help

Join Our Upcoming Webinar
Join us for a security webinar on Thursday, February 25th! We will be talking about how to secure your vulnerable environment. Register here.

Read more:
How to Keep Tabs on Your Network Security
Why You Need Cisco Talos
One or Many Approach to Security Vendors… Which is Better?

How to Keep Tabs on Your Network Security

Today, with cyber attacks occurring every 39 seconds, network security is more important than ever. Have you ever wondered about the best way to keep tabs on your own network security? Or if you should hire a dedicated network security engineer?

That’s what we’d like to help you determine.

SIEM Tools... Are They Worth It?

There are many great SIEM (Security Information and Event Management) tools available today. A good place to research the best is the latest Gartner report. We’ve reviewed each of the top tools in depth, and while they’re all great products, they are expensive.

These tools easily cost at least $2-3k per month, and that’s just to own the tool. It makes sense that they would be pricey, given that these tools are only good if constantly kept up to date. This requires a vendor with a heavy investment in security R&D.

Another cost factor is the computing and storage resources required to send heavy amounts of data to the cloud for analysis every single day.

As we reviewed all of this, we wondered how many of our clients are willing to make these investments?

We all know how impactful security breaches are to our businesses, but are we really willing to put our money where our mouth is, so to speak?

The issue with a SIEM tool is that once you make the initial investment, you need a person to be using the tool on a daily basis.

It can be difficult to get existing personnel to spend time on a tool like this while expecting them to be proficient and undistracted by other urgent matters. But to really get the ROI for a SIEM tool, you need a dedicated network security engineer—someone whose only job is to protect your business from security threats.

How to Choose the Best Option for You

Unless your business has at least 500 employees, you are not likely going to be willing to add these kinds of costs to your budget. But you still need to protect yourself. What are your options?

If your company is small (fewer than 500 employees), your best option is to outsource your security analyst job to a company that can manage it for you. This allows you to essentially share the cost of the tools and labor with several other companies in a similar position.

If your company is large and you don’t yet have these tools or people, you need to make a case to management on how much it will cost your company if you are breached. If your business goes idle for a day, what’s that worth?

We promise the cost of not doing something is far greater by a factor of 10 when you add up downtime, loss of productivity and revenue, etc.

No matter which path you choose, you must do something. You can’t ignore security and just hope you won’t get breached.

Hope is not a strategy.

If you’d like to look into managed security services, we can help.

Join Our Upcoming Webinar
Join us for a security webinar on Thursday, February 25th! We will be talking about how to secure your vulnerable environment. Register here.

Read more:
Why You Need Cisco Talos
One or Many Approach to Security Vendors… Which is Better?

The Best Next-Gen Physical Door Access Control System

About 4 years ago we moved to new offices here at Telcion. We love this space. It’s bigger, has that brick building retro feel with modern design, and is located in beautiful downtown Turlock. 

When we moved in, a physical door access control system was already in place. It used key fobs, which worked fine at first but became more annoying over time.

What We Didn’t Like About the Old System:

1. We had to rely on a vendor to program new key fobs.
Every time a new hire needed a key fob, we would have to wait days for the vendor to program it. A lengthy process for a simple task.

2. Key fobs are old-fashioned compared to mobile access.
If you’re walking up to the door with your hands full, digging into your pockets for a key fob is a pain. Especially when you consider that we all have Bluetooth- and NFC-enabled smartphones and sometimes even smart watches on us at all times.

3. It wasn’t integrated with our Meraki video surveillance platform.
We knew that being able to integrate access logs with security video footage would be a nice feature to have.

We knew there had to be a better access control system out there that would benefit both us and our clients.

Spencer uses his smartphone to unlock an office door.

While researching, we learned that most access control systems rely on multiple vendors. 

One vendor makes the reader at the door. One vendor makes the controller that connects these readers and works with a customized cloud solution. Another vendor handles the mechanical or magnetic strike locks.  And finally, another vendor installs and maintains everything. This is not ideal.

After three months of research and testing, we found an access control system that we believe is the best fit for most of our clients and for us.

The solution we chose is based on a cloud system by Genea. It’s as close to perfect as we could get.

What We Love About the New System:

1. Our new door readers support Bluetooth and NFC mobile devices.
This lets us open doors with our smartphones and watches. We love this feature.
2. It's managed through a cloud-based web app.
We can add and remove users whenever we want, as well as easily view reports. We can also add guest users for a fixed time as well, giving them access without an escort.  

3. Our Meraki video cameras integrate with the cloud solution so that the access control logs are linked to video footage.

4. Installation didn't require us to replace any of our existing wiring.

The Genea access control system really fixes the issues we had while giving us some cool new features as well. We’re happy to be able to offer this to our clients and would love to provide a demo any time you like.

Want to get to know us first?


Office Tour

A virtual look inside our space in downtown Turlock.


About Us

A brief overview of our company history.


Meet Ryan Flud

VP, Professional Services


Meet Michelle Padilla



Meet Eric Mueller

VP, Sales


Meet Jose Hernandez

RCDD, Structured Cabling


Meet Lance Reid