Has your desktop PC or laptop ever stopped working?
If it has, remember how frustrating and time wasting it was.
But what about your business? It relies on your computers, smartphones, tablets, networks, and web-based applications.
And if they were to stop working – either partially or totally – just imagine the disruption and damage to your organisation.
The five threats you face every day . . .
- Email fraud or phishing.
- Completely losing or not being able to access your data thanks to malicious ransomware and viruses.
- Unauthorised access to your data through online account or network hacking due to security weaknesses.
- Disclosure of confidential information by your employees' careless use of USB devices or storing unencrypted files on mobile devices.
- Unrestricted administrative privileges – the ‘keys to the kingdom’ – allowing users full access to systems and information.
. . . and three risks you run every day
- Power outages.
- Hardware failures.
- Storms, floods, fire – acts of God as insurers like to call them.
Why you must STOP thinking your business is too small to suffer a cyber attack or data breach
In 2019, Vanson Bourne – UK Technology Market Research specialists – surveyed 850 global companies with 10 – 1,000 employees.
64% of respondents had suffered a cyber attack.
- 1 in 5 small businesses will suffer a cyber security breach this year
- 81% of the victims are Small and Medium Businesses (SMBs)
- 97% of breaches could have been prevented with today’s technology
Cyber attacks on SMBs are becoming more commonplace because hackers know many are easy targets, unable to defend themselves.
To make matters worse, advanced threats – like hyper-targeted malware and ransomware – are becoming so sophisticated. And can now bypass the antivirus and firewalls SMBs think are protecting them.
You simply CANNOT assume it won't happen to us.
Instead you need to read this:
Five ways we help you protect your network and computers:
1. Identify your risks. Find out more . . .
First off, we identify exactly what needs protecting – especially your data.
And what level of protection everything needs. We:
- Run and analyse full security scans of your internal network
- Search the 'Dark Web' to see if any of your passwords, account details, etc are posted on it
- Pinpoint any gaps in your desktop computers' security
2. Prevent disasters. Find out more . . .
You must keep your data secure and protected. Here's how:
- Locally stored data – needs specific consideration because it may be particularly vulnerable to attack
- Encryption – a must for important files on mobile devices in particular
- Data replication – a ‘belt and braces’ approach for multi-site and other situations that allows you to keep operating if one site goes down
- Backup & restore – data storage on-premises, in the cloud, or both
What about power outages, equipment failure, fire, flood, or other disasters?
To prepare you for these, together we'll devise your disaster recovery plan.
Should the worst happen you'll know exactly what to do. And know your data is safe and ready to be recovered.
With everything in place, you need to test . . .
Think of it as a fire drill for your IT equipment and staff. We check:
- You can restore data from your backups; never assume anything
- Everyone knows how to follow your disaster recovery plan
3. Strengthen your internal security. Find out more . . .
You need to ensure your systems' users can only access the information they need to. So, we:
- Create and maintain a catalogue of all your user roles; and what they can access
- Check a user can access a particular piece of information by authenticating them against your security classifications
- Make sure you can identify all users – internal, external, and temporary – by giving them unique user id's
- Make sure there are no workarounds people can use by checking your network security groups and folder permissions
- Thoroughly check your user list for any inactive users or those with special access; and root out any suspicious accounts
- Review your Windows password policies to make
sure they're watertight – reporting on any weak passwords we find
What about your business applications?
For watertight security you need 'two-factor authentication': an additional one-time code sent via SMS whenever anyone wants to log in . . .
. . . just like many of the major banks use when you want to access your account.
This additional layer of protection ensures your data stays protected even if passwords are stolen.
And if you have old hard drives you need to retire . . .
. . . you need our guaranteed media destruction service to ensure your data never falls into the wrong hands.
4. Protect against intruders. Find out more . . .
Are you sure your network is fully protected from the outside world? It is when you let us:
- Slam shut any weaknesses intruders could use after a full security scan of your network
- Keep your network and servers safe from any unauthorised attempts to gain access to them; with our continual monitoring we'll know when they're trying to get in
- Only let the right people in; every aspect of your network is reviewed and checked; this includes your firewall configuration, VLAN access policy, router configuration, VPN / RDP security, and wireless networks
- Keep your servers, desktop, and laptops protected from infection and data theft; we make sure their operating systems and security software are always up to date
- . . . and do the same for your mobile devices to protect them against online threats, malicious mobile apps, unauthorised data release, and data theft
- Keep malicious viruses, spyware and other threats out by keeping your anti-virus and anti-malware applications always up-to-date
- Prevent malware getting into your network; approved and trusted applications are 'whitelisted' to allow access . . . your MS Office is set to block macros from the internet . . . your browsers configured to stop Flash & Java applications and ads are blocked
- Ensure you only receive genuine emails with our email filtering
- Manage and control all your remote access – for example, VPN, VPN Always On, and Direct Access
- Manage network traffic filtering on endpoint devices
- Help you if you have suffered a security breach or cyberattack; we recover your systems and fully investigate the cause(s)
5. Educate your staff. Find out more . . .
No matter how good your security and IT protection, the weakest link is always people.
So, we develop security guidelines for your employees:
- How to protect your IT infrastructure
- What constitutes acceptable use of the network, internet, and email
- How to create strong, secret passwords; this is one of the simplest and most effective steps you can take
Finally, we'll train your people:
- To be aware of your policies
- To take their security obligations seriously
- To recognise – and avoid – online scams
Want to be even more secure?
Let us implement advanced security solutions for you.
To find out more, call Shawn Zeppel on 08 8342 3255 or email firstname.lastname@example.org
What you need to do now
It’s important you understand cyber security is complex and continually changing.
There is no 'magic solution' and what works today may not in the coming weeks and months.
Effective cybersecurity is a multi-pronged weapon which, to an extent, depends on your business priorities.
Your security challenges and requirements are very different depending on whether you do some, all, or none of these:
- Manage very sensitive client information
- Regularly transact large sums of money on behalf of clients
- Have staff continually accessing your network from remote locations
- Offer guest access to your Wi-Fi or main network
You need to:
- Establish where your security is today. Let us help you with a FREE, no obligation, Network & Security Audit to quickly identify obvious weaknesses.
- Make sure you have your cyber security essentials covered.
- Know what additional protection you need. What are your business priorities? How can cyber security mitigate any risks for you?
- Determine the security solutions you need to implement – with a practical approach to ensure success
Want to find out more?
If you'd like to know more – or have a FREE Network & Security Audit – please get in touch.
Just call Shawn Zeppel on 08 8342 3255 or email email@example.com
Is your network secure?
Let us tell you. Say yes to your FREE Network & Security Audit.
Your free assessment will:
- Review your network equipment, servers, desktops, laptops, printers, applications – the lot
- Identify any risks or weaknesses – in an easy to read report
- Tell you what action you need to take
. . . it's like a complete check-up at the doctor's.
To request your free audit . . .
just call Shawn Zeppel on 08 8342 3255