Cyber Security

Keeping your network secure, your data safe, and your client’s data safe is top of mind. With cyber-attacks rising, even passive security is essential for all businesses. If you’ve not had a security breach, it’s not a case of if, but when.

data protection and internet security concept, user typing login and password on computer, secured access

Why should I be worried about cyber-security?

With cyber-attacks being reported frequently, even large corporates or government organisations are not safe from such attacks. You don’t need to search for long to find articles about outdated software or hardware, denial-of-service (DoS) attacks, or even internal security breaches. If these attacks hit big businesses, they most certainly will hit your business at some point. We have had clients that were attacked several times, each time from one of their team opening an email by mistake. These are well-trained clients who are using email all day – you would think they are wise to these attacks.

Providing protection

Whilst we are not insurance salespeople, one of the best ways to protect yourself (other than having a great IT partner) is to have a Cyber Liability policy with your insurance broker. Cyber insurance covers the costs of containing a breach and potentially some of the impacts of these attacks.

We advise all our clients to have even a minimum cover. Our team can take care of the assessment documentation when your broker requests it to save you time filling it out.

Three areas of cyber-security you should consider

  1. People – educating your team to prevent user mediated attacks
  2. Processes – onboarding and offboarding your users; keeping data secure, including laptops and phones
  3. Technology – keeping systems up-to-date and secure; regular software and security updates; replacement of ageing hardware (where the software or security updates are no longer available)

Educating your team

Training your team about the risks to your business is key. Most attacks happen from within your network. A penetration test is a common way to find a security gap with your staff. A USB key is dropped somewhere public (like reception), and when it’s plugged into a computer, it calls home and says, “I’ve been found”. When companies that provide this kind of testing do this, they report that it’s commonly plugged in within 20 minutes of dropping the USB despite policies and training to educate clients NEVER to insert USB drives into their computer. This is a case of curiosity trumping policy!

Teaching your team is all about minimising and mitigating risks to your network, data, and client data. It needs to be ongoing to ensure your team are aware of the risk to your business – in some cases; you’d have no business if the breach is big enough as the cost to recover can to too high.

Securing your Network

Keeping your network secure can be done in many ways. Often external breaches are from poor network security. One example is Remote Desktop or Terminal Services being publicly accessible. Services like this were never designed to be run over the Internet but often are. These services are easy to secure with a VPN (a virtual private network) which encrypts traffic to and from your office. VPNs are perfect for working-from-home (WFH) situations and keep your work traffic inside your work network. VPNs are also useful for VoIP phones. Most protocols that VoIP phones use are not secure or encrypted, which makes eavesdropping on calls easy.

How we work GET AN IT
SUPPORT QUOTE

Let's talk

We’ll discuss your business needs, how you use technology, and what you want to get out of systems.

Choose Your Options

If we’re the right fit, you can choose the IT service agreement inclusions that work best for your budget.

Start Your Stress-free Experience

Once setup, you’ll be experiencing IT service like never before.

Finding an IT vendor that understands your business needs shouldn't be hard. Contact us today to see if we are a good fit for you and your team.

Backed by 15+ years of commercial IT experience, we've run networks from a handful of workstations through to large networks with 100's of workstations and laptops. We've worked out how to scale services from 10 workstations to hundreds, so you get the cost savings of larger networks but the support you need to keep your business running.

How we work GET AN IT
SUPPORT QUOTE

Let's talk

We’ll discuss your business needs, how you use technology, and what you want to get out of systems.

Choose Your Options

If we’re the right fit, you can choose the IT service agreement inclusions that work best for your budget.

Start Your Stress-free Experience

Once setup, you’ll be experiencing IT service like never before.

Finding an IT vendor that understands your business needs shouldn't be hard. Contact us today to see if we are a good fit for you and your team.

Backed by 15+ years of commercial IT experience, we've run networks from a handful of workstations through to large networks with 100's of workstations and laptops. We've worked out how to scale services from 10 workstations to hundreds, so you get the cost savings of larger networks but the support you need to keep your business running.

Let's talk