How to secure your companies IT like a boss
I’m sure you agree with me when I say that there is not a week that goes by when you don’t see an email or hear about a cybersecurity breach and how cybercriminals have bled another victim dry of money. This is the first of a multi-part series where I will delve into securing your SaaS applications, talk about End User Education and best practices and why you should utilise Two Factor Authentication (2FA) where possible.
It’s only been revealed in the past week that security experts have discovered potentially one of the largest breaches of all time, where over 772 million unique emails and approximately 21 million unique passwords have been discovered.
In this article, I’m going to outline the three most effective ways to secure your IT systems in your business and your personal life.
As a bonus, I promise not to make this too technical and you’ll find out exactly why this need not cost a penny. Don’t forget to download your 2019 Small Business IT Security Blueprint at the end of this article.
Number 1: Cyber awareness.
People are by far the weakest link in any small businesses IT systems. You could invest hundreds or even thousands in a new IT security system, and it could quite easily be bypassed by one of your colleagues that does not have an awareness of what to look out for in a classic phishing email.
Luckily the solution is simple.
Time is the only investment.
Just make sure you are running regular lunch and learning sessions with your current technology provider. This can be as quick as a half hour session to go over the latest threats that may be landing in your inbox.
Your IT/Technology provider will have a good idea of what this looks like as they’re dealing with cyber threats daily and are “in the know” on what to look out for.
Number 2: Enforce multi-factor login
Those in the know call this MFA or 2FA but we are keeping this simple so multi-factor login is a little more understandable. It’s making sure that any of the cloud services you’re currently utilising are protected with two passwords also known as a second token and not just one.
This is implemented by having a standard password and a secondary password which is usually authorised by your smartphone.
Running either an app on your phone or a text message that asks you merely to approve/deny the login to your cloud service when you are at the login page.
This is by far one of the best methods to protect against hackers as most hacks over the last 12 months have been to cloud services such as Office 365 by cybercriminals pretending to login you into a genuine cloud service. Without access to your smartphone, they have little chance of bypassing this multi-factor login security.
Number 3: Check your backup service.
When I tell you about this next tip, you’re not going to believe how obvious it seems. If your IT systems do become victim to an attack, you may find that the only way to recover your systems is by changing passwords and restoring your files from a backup.
We’ve seen this one too many times to count from clients coming over to us in the past when a ransom is asked for.
Their current IT provider fails at the most crucial stage and that is by backing up the company data correctly.
While the business may have backup software in place and it’s turned on no one at the IT company has checked to see if files and data can be restored from the backup. Such a simple thing that is missed out.
Ensure your backups are regularly tested and make sure that you can restore from a recent backup as part of that test.
These are just some of the most obvious tips I’ve outlined in this article and if you’d like to hear more about some other crucial steps that you can implement in your business that don’t require massive investment then please connect with me and reach out to the team at GKM2 below.
Don’t forget to download your free 2019 Small Business IT security Blueprint.