7 Layers

7 Layers of Maturity

WHAT ARE THE 7 LAYERS OF MATURITY?

I want to talk to you about the seven layers of cybersecurity for families. This is just a brief overview of the seven layers of cybersecurity, which will help you understand cybersecurity as it applies to your family. There are plenty of systems to apply cybersecurity to businesses, but there are very few, if any, that really do the job of helping you understand how to apply cybersecurity to your family. That’s what we do. We take the complex world of cybersecurity and explain to you how you can get started protecting your family, and we do this by breaking cybersecurity down into the following seven layers: 

  • behavior 
  • data protection 
  • network/communication  
  • identity  
  • hardware/platform  
  • monitor/audit 
  • remediation/recovery 
  • and education. 

We want to protect your family and secure their future. That is our purpose, and that’s what why we’ve developed our tools. So, check out our materials, especially the seven layers. Then check out one of our workshops — whether virtual or live — because the workshops will help you learn more than the videos and all the content that we give away for free online. Once you’ve completed the workshop, you can use our workbook to walk you through important steps. I would like to say these steps are easy, but some of them are not so easy. However, these steps will give you practical things you can do right now. We have a video about each of the seven layers and a workshop that explains the process in more detail. 

Learn from Wade Wyant, Founder and Chief Analyst about the 7 Layers of Maturity

ADDITIONAL DETAILS ON THE 7 LAYERS OF MATURITY

LAYER 0
BEHAVIOR

We call this Layer Zero, because as IT professionals we cannot control your behavior. We simply use this layer to remind you of best practices.

LAYER 1
DATA PROTECTION

This layer focuses on protecting what is important.

LAYER 2
NETWORK/COMMUNICATION

Protecting your internal network and communication.

LAYER 3
IDENTITY

As the internet and digital solutions grow, you have more accounts and passwords. This layer helps you to secure your online identity.

LAYER 4
HARDWARE/PLATFORM

It is critical that you identify what devices you use and if they are secure. Consistency plays a big part in creating a secure environment.

LAYER 5
MONITOR/AUDIT

Trust but verify via this layer.

LAYER 6
REMEDIATION/RECOVERY

Unfortunately, it is not a matter of if — but when — you will be compromised. Being prepared is critical.

LAYER 7
EDUCATION

Using what you've learned in layers 0-6, it is important to increase your security posture with additional education for our families.