Which security threats to worry about? |
If you read the news or follow tech related blogs, it seems that there is a new security threat nearly every day. Some days it’s a new website that hijacks your mobile browser, other days it’s a sensationalized news story about an elite hacker group releasing the names of a website’s users. With all these issues, it can be hard to zero in on which threats you should be worrying about. Here’s an overview of the three most common security threats small to medium businesses face. Targeted external attacks Taking these steps will ensure your system is nearly 100% safe. Granted, skilled and determined hackers can always find ways into systems though. Systems that are harder to hack, or take longer to hack due to stronger security measures, will generally deter nearly all external attacks. Targeted internal attacks If this sounds like your company, it’s a good idea to take stock of who has access to what, and see if maybe you’ve been a little too liberal with it. You don’t want to completely lock systems and acces down though, as this could hinder your employees from doing their jobs. If you have servers or routers it probably isn’t a good idea to give all employees access to the settings of the system. Instead, either let someone with experience manage these systems, or work with a Managed Service Provider who can look after all this for you. BYOD Many BYOD related security cases we’ve seen come from when an employee brings in a device that isn’t up-to-date and connects it to the network. Reading update notes for most programs will show that the patch fixes many known security issues; an unpatched machine makes it easier for hackers or other criminals to gain access to a network. Aside from that, many companies don’t have a method in place to identify what devices employees bring to the office. This makes it hard to pinpoint where security breaches happen, and how to fix them. We’re not saying BYOD is bad, it just needs to be handled properly. You should create a list of approved devices along with a list of who brings in what devices, and establish a policy that employees must ensure their systems are up-to-date and follow company security measures. One of the easiest ways to do this is to have your security expert look at the devices connected to the network. Each device has a MAC address – a unique ID – that can be recorded and added to a security white list. If the device doesn’t meet established standards, or isn’t on the MAC address list, then it’s not allowed to connect without authorization. Contact us to find out how we can help reduce security threats in your business. |
Delay that inflammatory email on Outlook |
How many times have you written a pithy reply to an email, hit send confidently only to realize you called the original sender something along the lines of a male donkey? Normally there would be a mad scramble to stop the email from being sent, only to realize that once you have hit the send button, you can’t take it back. If you use Microsoft Outlook, you can put a delay on your email, giving you a chance to cancel sending it. |
Are Android tablets good for business? |
Christmas is less than two months away, that means companies had better get their products out the door in time for the festive rush. Google is no exception, and has scheduled an event for October 29. Word on the street is that they will introduce a new tablet, among other things. This will likely have many professionals jumping to introduce a tablet into their business system. However, it’s worth pausing for a moment and thinking if a tablet is a good fit. |
5 steps to finding a perfect VA |
Running a business can be both a dream and a nightmare, as there is always something that needs to be done, and many owners/managers lack the skills or time to do everything. While this may cause some owners to feel frustrated, there’s no need for them to feel this way. However, it’s an indication that you could probably use the help of a virtual assistant. If you’re interested in hiring a PA there are some important steps you should follow. |
How the cloud is transforming health care |
Cloud computing is still a relatively new information technology concept, but it’s already beginning to be relevant in health care – because it utilizes economies of scale to provide massive computing power and storage to users who sign up for the service. Here are five ways cloud competing is transforming health care. |