. . . before you wished you had
Has your desktop pc or laptop ever stopped working?
If it has, remember how frustrating and time wasting it was.
But what about your business? It relies on your computers, smartphones, tablets, networks, and web-based applications.
And if they were to stop working – either partially or totally – just imagine the disruption and damage to your organisation.
The five threats you face every day . . .
- Email fraud or phishing.
- Completely losing or not being able to access your data thanks to malicious ransomware and viruses.
- Unauthorised access to your data through online account or network hacking due to security weaknesses.
- Disclosure of confidential information by your employees' careless use of USB devices or storing unencrypted files on mobile devices.
- Unrestricted administrative privileges – the ‘keys to the kingdom’ – allowing users full access to systems and information.
. . . and three risks you run every day
- Power outages.
- Hardware failures.
- Storms, floods, fire – acts of God as insurers like to call them.
I'm not trying to alarm you but . . .
The volume, speed and sophistication of cyber-attacks is ever increasing.
In May 2016 USA Today wrote:
“The FBI has recently warned that ransomware attacks against hospitals, schools, government agencies, police departments, businesses, and individuals are dramatically increasing.”
And in May 2017 the WannaCry ransomware cyber-attack infected more than 200,000 computers in 150 countries.
As you can see, you mustn't assume it won't happen to us.
So, what should you do?
Here's six ways we help you protect your computers and networks:
1. Identify your risks
First off, we identify exactly what needs protecting – especially your data.
And what level of protection everything needs.
2. Prevent disasters
You must keep your data secure and protected. Here's how:
- Locally stored data – needs specific consideration because it may be particularly vulnerable to attack
- Encryption – a must for important files on mobile devices in particular
- Data replication – a ‘belt and braces’ approach for multi-site and other situations that allows you to keep operating if one site goes down
- Backup & restore – data storage on-premises, in the cloud, or both
What about power outages, equipment failure, fire, flood, or other disasters?
To prepare you for these, together we'll devise your disaster recovery plan.
Should the worst happen you'll know exactly what to do. And know your data is safe and ready to be recovered.
3. Test your readiness
With everything in place, you need to test.
Think of it as a fire drill for your IT equipment and staff. We'll check:
- You can restore data from your backups; never assume anything
- Everyone knows how to follow your disaster recovery plan
4. Strengthen your internal security
You need to ensure your systems' users can only access the information they need to. So, we:
- Create and maintain a catalogue of all your user roles; and what they can access
- Check a user can access a particular piece of information by authenticating them against your security classifications
- Make sure you can identify all users – internal, external, and temporary – by giving them unique user id's
- Make sure there are no workarounds people can use by checking your network security groups and folder permissions
- Thoroughly check your user list for any inactive users or those with special access; and root out any suspicious accounts
What about your passwords?
We review your Windows password policies to make sure they're watertight – reporting on any weak passwords we find.
And if you have old hard drives you need to retire . . .
. . . you need our guaranteed media destruction service to ensure your data never falls into the wrong hands.
5. Stop intruders
Are you sure your network is fully protected from the outside world? It is when you let us:
- Keep your servers, desktop, and laptops protected from infection and data theft; we make sure their operating systems and security software is always up to date
- . . . and do the same for your mobile devices to protect them against online threats, malicious mobile apps, unauthorised data release, and data theft
- Keep malicious viruses, spyware and other threats out by keeping your anti-virus and anti-malware applications always up-to-date
- Only let the right people in; we review your internet gateways, firewalls, VPN / RDP security, wireless networks, and content filtering
- Slam shut any weaknesses intruders could use after a full security scan of your network
- Help you if you have suffered a security breach or cyberattack; we recover your systems and fully investigate the cause(s)
- Keep your network and servers safe from any unauthorised attempts to gain access to them; with our continual monitoring we'll know when they're trying to get in
6. Educate your staff
No matter how good your security and IT protection, the weakest link is always people.
So, we develop security guidelines for your employees:
- How to protect your IT infrastructure
- What constitutes acceptable use of the network, internet, and email
- How to create strong, secret passwords; this is one of the simplest and most effective steps you can take
Finally, we'll train your people:
- To be aware of your policies
- To take their security obligations seriously
- To recognise – and avoid – online scams
Want to find out more?
If you'd like to know more – or have a FREE Network & Security Audit – please get in touch.
Just call Shawn Zeppel on 08 8342 3255 or email firstname.lastname@example.org
Is your network secure?
Let us tell you. Say yes to your FREE Network & Security Audit.
Your free assessment will:
- Review your network equipment, servers, desktops, laptops, printers, applications – the lot
- Identify any risks or weaknesses – in an easy to read report
- Tell you what action you need to take
. . . it's like a complete check-up at the doctor's.
To request your free audit . . .
just call Shawn Zeppel on 08 8342 3255