|What security threats should I focus on?|
Security is a big issue, and big business for many IT companies. There are always security threats, and according to media outlets, most security threats are coming from highly advanced groups capable of launching incredibly complex attacks that bring widespread technical devastation. While these are dangerous, many security threats affecting small to medium businesses are much simpler.
Here’s an overview of the three most common security threats small to medium businesses face.
Targeted external attacks
Taking these steps will ensure your system is nearly 100% safe. Granted, skilled and determined hackers can always find ways into systems though. Systems that are harder to hack, or take longer to hack due to stronger security measures, will generally deter nearly all external attacks.
Targeted internal attacks
If this sounds like your company, it’s a good idea to take stock of who has access to what, and see if maybe you’ve been a little too liberal with it. You don’t want to completely lock systems and acces down though, as this could hinder your employees from doing their jobs. If you have servers or routers it probably isn’t a good idea to give all employees access to the settings of the system. Instead, either let someone with experience manage these systems, or work with a Managed Service Provider who can look after all this for you.
Many BYOD related security cases we’ve seen come from when an employee brings in a device that isn’t up-to-date and connects it to the network. Reading update notes for most programs will show that the patch fixes many known security issues; an unpatched machine makes it easier for hackers or other criminals to gain access to a network. Aside from that, many companies don’t have a method in place to identify what devices employees bring to the office. This makes it hard to pinpoint where security breaches happen, and how to fix them.
We’re not saying BYOD is bad, it just needs to be handled properly. You should create a list of approved devices along with a list of who brings in what devices, and establish a policy that employees must ensure their systems are up-to-date and follow company security measures. One of the easiest ways to do this is to have your security expert look at the devices connected to the network. Each device has a MAC address – a unique ID – that can be recorded and added to a security white list. If the device doesn’t meet established standards, or isn’t on the MAC address list, then it’s not allowed to connect without authorization.
Contact us to find out how we can help reduce security threats in your business.
|How to successfully find a great VA|
There are many different ways you can virtualize your company. Many companies virtualize the easier tech related functions like desktops, telephone and sales. Virtualizing systems like these are great at making specific jobs easier, however they don’t make it easier to stay on top of things. That’s why busy managers and entrepreneurs hire assistants. Don’t have a PA, or the budget to hire one? Take steps to hire a virtual one.
|Make tasks easier with Automator for OSX|
Modern operating systems have so many features, many of which go unused, or are even unknown to users. Apple’s OS – OS X – is no different. There are a number of unknown or avoided features most users open once, see that they look complex and decide to never open again. However,with a little know-how, these could be some of the most useful features.
|Delay Outlook from sending emails?|
Email is both a blessing and a curse. While it has made communication infinitely easier compared with snail mail, it has also led to a number of embarrassing incidents where emails have been sent with the wrong information or worse. This might lead to loss of clients or jobs. If you use Microsoft Outlook, this risk can be avoided, or at least minimized, by delaying the sending of emails to give you time to read what you’ve written, or cancel a mistakenly sent email.
|5 Facebook facts that benefit your biz|
Social media, once the domain of tweens, teens and college students has expanded to encompass nearly all aspects of life. You have grandmas sharing YouTube videos of their grandchildren’s first birthdays, businesses sharing their latest research or even conducting their whole marketing campaign online. This phenomenon is commonly labeled as social media, or as many see it, the modern Internet. While a collection of websites has allowed this to happen, Facebook is the most prominent.