Unfortunately, it is a dangerous world out there, and it is full of people constantly on the lookout for opportunities to attack your technology, and make money out of you.
Here we share our basic recommendations for IT security and support.
If you do not have the basics of security in place, then you quite simply make yourself a more attractive target.
Why attempt to break into the well-secured house when the one next door is wide open and much easier?
Cyber criminals are not dissimilar to this. Like any ‘business’ person, they are looking for a return on their investment of their time, and hacking easier targets often gives that.
In fact, one of the reasons why more smaller businesses are being targeted, is that the bigger businesses and organizations are generally well-protected these days.
By our clients having a decent level of protection, you are less likely to be hacked successfully.
Important – virtually no amount of security can make you invulnerable. It is not about that. It is about spending the right amount of money for your situation, to reduce the risk. Even a modest spend means massively less risk than no or inadequate protection.
You need some sort of system to be able to prevent and/or detect many of the attack techniques used today. Traditionally known as “anti-virus”, today’s software is often far more powerful than just detecting viruses.
For most of our clients, because of their general risk level, we recommend an “end point security” product. This is suitable for today’s complex threat environment at the small to medium business level.
We find the right level of security for your business needs, balancing protection without paying for more costly products.
We can manage all of this remotely via our cloud console. To read more about our security recommendations click here.
A key way the attackers can exploit businesses is if the computer operating software is not up to date.
Microsoft is always updating its Windows and Server operating system, as new vulnerabilities are uncovered. These are then pushed out as updates, but these can fail or cause issues sometimes.
Many computers are not set up to take these patches. Ultra IT has a system where we manage these updates, ensuring they are successfully applied, and ensuring the bad ones are remedied before you get them.
2FA – Two Factor Authentication
We’ve written a few blogs about this over the years, and it has been the topic of many discussions! The bottom line is that for most businesses, having Two Factor Authentication in place is an absolute no-brainer.
Even if “they” do manage to get into your email account, having 2FA turned on will mean they can’t do anything unless they also have your smartphone.
Similarly, the days of having your dog’s name with a number after it as your password, and using it everywhere, are long gone.
Like all security, it is a bit of a hassle, but it needs to be done. Ultra IT can help you with this to some extent, but what you and your team do is not an IT issue, it is a business issue. We highly recommend that you use strong passwords.
Here is another previous blog on password management systems.
It is still very true that most hacks are successful because someone clicked on something they shouldn’t have.
How do you support your team to be aware of these risks, and to be constantly vigilant?
There is much you can do, including subscribing to services that send phishing emails to your team to see if they click or not, But at the very least (and this doesn’t cost anything) we suggest that owners and managers periodically raise this topic and simply discuss with their teams Just being reminded and aware is better than nothing.
The five items above are our most basic and standard recommendations. There are obviously other things that you should be doing too. But if you have the items above ticked off, you at least have a prudent minimum level of protection in place.
You are far less likely to be successfully hacked if you have the basic precautions in place. Please contact us here if you would like any help with any of the above.