Business Tools to Take Your Business Out of The Office

business-tools-social

Being engaged in business used to mean staying wired in at the office eight to twelve hours a day.  In the modern day, this is completely untrue.  Often the most efficient workplace is spread far and wide and always on the go.

Today you can completely unplug from your desk with just your laptop computer and 4G modem.  The freedom to work out of the office and even on the move is a huge advantage gifted to modern business.  A simple mobile hotspot is enough to work from anywhere in the world.

The Right Tools for the Job

The most important part of working on the go is ensuring you don’t lose touch with your team.  Maintaining total collaboration between team members can be tricky.  Luckily, there are tools that will help you to stay on top.

Microsoft Office 365 provides the traditional tools and support of Microsoft office, but adds remote team collaboration and cloud support too.  Files can be saved into the cloud, worked on, and accessed anywhere for review. At one time, remote working meant taking a copy of a file somewhere else to work.  Changes to the original weren’t reflected in the remote copy and at least one version was destined to be lost forever.

Software packages such as OneDrive allow the entire team to work on a single centralized file saved to the cloud.  Whether you edit on a beach, plane, or train; your team in the office gets the same version you do, at the same time.

Collaborative Working

The key to remote working is the ability to collaborate in a digital space with everyone at once.  Modern software such as Office 365 allows all team members to be working on a single document at the same time.

Whether the project calls for killer spreadsheets, expertly crafted documentation, or a knockout presentation; everyone can pull together and hit it out of the park.

Even when you’re not working out of the office or busy on the road, collaborative software can help to power your team working locally too.

Admin Done Remotely

Modern software has impacted the way in which we do bookkeeping and accounts too.

Similar to being tied to your desk in years gone past; accounting software was once stuck solidly in the desktop too.  Previously,  batch runs of calculations were required to provide reports on a weekly, bi-weekly, or monthly basis.  Today, cloud computing has opened up ways to speed up business in ways we couldn’t have imagined.

Cloud-based accounting packages such as Quickbooks Online allow for your accounts to be done remotely.  Moving the resource and strain out of your firm takes it out of sight and out of mind.

Security and maintenance of your accounts databases, for example, falls to cloud professionals instead of your business.  Rather than waste company time on submitting documents and calculating taxes they are done in the cloud and submitted to you instead.

Make your Accounts Work for You

Maintaining your accounts is made as simple as logging into a single portal.  This tool allows you to take both your admin and your work out of the office and keep it on the go.

By the time your accounts are due, your accountant simply has to log in remotely and pick up where you left off.  By the time taxes are due the work is done and you can get on with the important things.

Getting work done out of the office and on the go is a huge boost to productivity.  Modern technology enables you to keep team members up to speed, continue collaborating, and even stay on top of your accounts from anywhere in the world.

Give me a call today at (828) 290-8237 to talk about how you can unwire from the office.

More Than A Virus, Common Malware to Watch Out For

types-common-malware-social

The term “virus” is often used to describe many different types of infection a computer might have.  Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network.

Malware describes software designed to act maliciously on a personal computer.  The name ‘malware’ is a shorthand for ‘malicious software’ and describes exactly what it is. A computer virus is a single type of malware that can cause harm to your PC, but it is only one of many.

Adware

Short for advertising-supported software, adware is a type of malware that delivers advertisements to your computer.  These advertisements are often intrusive, irritating, and often designed to trick you into clicking something you don’t want. A common example of malware is pop-up ads that appear on many websites and mobile applications.

Adware often comes bundled with “free” versions of software that uses these intrusive advertising to make up costs.  Commonly it is installed without the user’s knowledge and made excessively difficult to remove.

Spyware

Spyware is designed to spy on the user’s activity without their knowledge or consent.  Often installed in the background, spyware can collect keyboard input, harvest data from the computer, monitor web activity and more.

Spyware typically requires installation to the computer. This is commonly done by tricking users into installing spyware themselves instead of the software or application that they thought they were getting. Victims of spyware are often be completely unaware of its presence until the data stolen is acted on in the form of fraudulent bank transactions or stolen online accounts.

Virus

In technical terms a computer virus is a form of malware that is installed inadvertently, causing damage to the user.  A typical virus may install a keylogger to capture passwords, logins, and bank information from the keyboard.  It might steal data, interrupt programs, and cause the computer to crash.

Modern virus programs commonly use your computers processing power and internet bandwidth to perform tasks remotely for hackers.  The first sign of this can be when the computer sounds like it is doing a lot of work when no programs should be running. A computer virus is often spread through installing unknown software or downloading attachments that contain more than they seem.

Ransomware

A particularly malicious variety of malware, known as ransomware, prevents the user from accessing their own files until a ransom is paid.  Files within the system are often encrypted with a password that won’t be revealed to the user until the full ransom is paid.

Instead of accessing the computer as normal, the user is presented with a screen which details the contact and payment information required to access their data again.

Ransomware is typically downloaded through malicious file attachments, email, or a vulnerability in the computer system.

Worm

Worms spread across computer networks by exploiting vulnerabilities within the operating system.  Often these programs cause harm to their host networks by consuming large amounts of network bandwidth, overloading computers, and using up all the available resources.

One of the key differences between worms and a regular virus is its ability to make copies of itself and spread independently.  A virus must rely on human activity to run a program or open a malicious attachment; worms can simply spread over the network without human intervention.

If you would like to make sure your systems stay safe from malware, give me a call at (828) 290-8237.

Storage Struggles? How to Keep Up with the Data Explosion

explode-data-social

Many businesses have already embraced the benefits of going fully digital.  It has allowed them to do more than ever before; saving both time and money.  It has saved them a ton of space too, eliminating the need for stacks of file cabinets in every office.

The digital boom presents brand new problems too.  By moving all your files into a digital space, the amount of storage you need to maintain has grown larger and larger just to keep up.

As digital technology has improved, the resolution, clarity, and size of the digital files we create has exploded.  Items such as X-rays, which used to be printed on film are now digital files transferred by computer.  As a result of the increase in both the number of digital files we use and their ever-growing size, the size of the data we need to store has exploded exponentially.

There are a number of ways in which we can tackle your ever-growing storage problem.

Local server or Network Attached Storage (NAS)

A local server is a machine physically located within your own office or building.  These are typically designed to serve many files to multiple clients at one time from locally held storage.
The primary advantage that a local network server has is that all your vital data is available to all users in one central location.  This means that employees across the network can access all the resources made available.

These machines can serve files at the speed of the local network, transferring large projects, files, and documents from a central position within the network with ease.

A NAS has many of the same network properties, typically packaged as a smaller profile, low powered computer.  A NAS is specifically designed to enable network file sharing in a more compact package.  These can be available in units small enough to fit in a cupboard nook and yet still provide staggering storage capacity on only a small amount of power.

Both a local server and NAS device allow for large amounts of storage space to be added to the local network.  These units are often expanded with more and more storage over time. As an organization grows over time, so do its data storage requirements.

Cloud Storage

Sometimes the best option for storage is to move your ever-expanding data outside of the business completely.  Often, offloading the costs of hardware and IT management can work out to be an intelligent business decision. One that provides freedom and flexibility in your data storage needs.

The major advantage of cloud storage comes from the ability to expand and contract your services as needed without the unnecessary overhead of adding and maintaining new hardware.

By moving storage to the cloud, data can be accessed from anywhere in the world.  The flexibility provided by cloud storage allows limitless expansion to any number of devices, locations, and offices. Being able to access data from many locations at a single time can often provide a valuables boost to productivity that can help to speed projects along.

Some of the drawbacks of cloud storage come from factors that may be outside of the control of the business.  Not all internet connections are found to be up to the task of handling large amounts of data to and from the cloud.  In some cases, the infrastructure is quite simply not in place yet to support it.
IT security regulations can prove to be a barrier to enabling storage in the cloud too.  Some regulations either prohibit the feature entirely or enable only certain specific types for use.

The Right Choice for your data

Both cloud and local storage can provide further benefits to enhance your business. Audit logs, central backups, and version control can all be used to secure the way your firm handles data.

Whatever your situation, whether a small NAS can boost your office productivity, a local server can provide the connectivity missing from your firm, or cloud storage can switch on new resources, I can advise on the best choices for your business.

Give me a call at (828) 290-8237 to help you make the right choice for your data.

Are Registry Cleaners a Good Idea?

registry-cleaner-social

You have likely been alerted by popups while browsing the web.  These, often flashing, advertisements claim your computer has more than a thousand errors requiring urgent attention to fix.  Perhaps helpfully, these popups offer a solution to cure your computer with a click of the mouse.  Buttons marked “fix now” appear to offer a simple fix to all your computer troubles.

These advertisements are often described as Registry Cleaners, or by a few other names that attempt to convince the user they will somehow clean or improve their home PC.  Within the IT industry they are known as “scareware”.  They are software designed to convince you that your computer has problems it might not have.

Are they trustworthy?

Almost all popups and advertisements that use banners saying “Fix now for free” are not trustworthy at all.  They are little more than a scam attempting to take your credit card details, PC data or both. At best these programs might claim to scan your computer and show a convincing list of plausible sounding computer problems.  Using this, they will ask for payment to “fix” these problems to get your PC back in shape again.

At worst these advertisements can be downright malicious. Some may attempt to use fake warnings and scare tactics to trick customers into installing spyware on their own computers. When installed, spyware will attempt to steal information in the background.  Attackers may use this technique to steal usernames, passwords, emails, and credit card details.  Sometimes the first sign a user has that something is wrong is when a virus scan detects software doing something it shouldn’t be.

Do I need to clean the registry?

The Windows system and various applications installed on your PC do leave files on stored your computer.  These files can stay behind or go out of date even after the application that initially made them has been removed.  These files can use up a little space on the hard drive and generally cause minor clutter within the system.

Despite the large amount of “scareware” and fraudulent computer cleanup scans out there, legitimate applications designed to clean your system do exist.  This can be something I cover and is often done as a single small part of a complete computer tune up. Keeping up with out of date files and freeing up unused space is worthwhile and can be considered “good housekeeping”.  The vast speed boosts many online advertisements claim to unlock by simply moving files around are almost always false.
The home computer, however, is commonly upgraded and can be boosted by more conventional means. If the speed of your PC is no longer up to the task, there are ways in which you can unlock far greater gains than simple housekeeping chores.

PC Boosters

Relatively low-cost hardware components such as memory can often be added to boost the speed of even an older PC and unlock a new lease of life.  Upgrading the computers RAM can double the working memory available to the operating system. With extra memory, many programs can keep more information available to work with. This upgrade reduces loading times and increases the computers ability to run more programs at once.

Another common speed boosting upgrade involves how we store and load data from the computer. Switching from an older style mechanical hard drive to a modern Solid State Disk (SSD) can bring down the startup and loading time of any PC.

Loading data from the hard drive is very often the slowest part of a computer, the bottleneck in an otherwise very fast system.  Because an SSD does not use any mechanical components the time to access the disk is nearly instant when compared to older, mechanical hard disks.

Safe Speed Boosts

These upgrades offer boosts in speed to rival a modern system at only a fraction of the cost originally paid for the computer. Upgrading the RAM, swapping to an SSD, or doing both will provide an instant, dramatic, and safe improvement to the speed of your PC.

If your computer is running slow give me at a call at (828) 290-8237  to arrange a real and professional cleanup.

4 Signs You’ve Been Hacked

are-you-hacked-social

Being hacked is a huge fear of most computer users.  Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control.  But are hackers really inside your machine, stealing your information? Or should you be on the lookout for more subtle signs?  What does being hacked really look like?

There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both.  There are of course ways that you can defeat these processes, but what if you are instead hacked by an individual?

Logins not working

One of the first steps a hacker might take would be to change the computers passwords.  By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control.  With this in mind, you always want to make sure to keep on top of our own login details and how often you change them.

Security Emails or Texts from online services

Many services track which device and location you logged into your account from last.  If your account is accessed from a new device or a different country it might trigger an automated email or text message to ask if this new login is your own.

If you have logged in using a new computer, tablet, or phone; an email that asks “hey, is this you?” need not be cause for alarm.  If you haven’t, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Bank accounts missing money or strange transactions

Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.

It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.

You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction.

Alternatively small, hard to notice transactions may appear.  These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden loss of cellular connectivity

Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication.  To do this they send a short code to your phone or app when you log in.  Two-factor authentication is ideal in most cases and a great boost to security.

Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen.  During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in.  From your perspective phone service will simply stop working.

Keeping vigilant and maintaining security

These are only some of the modern techniques that hackers can try to use to gain access to your accounts.  It pays to pay close attention to the signs and signals that indicate you may have been hacked.

If you suspect that you might have been hacked, or would like help to prevent hackers in future, give me a call at (828) 290-8237.

Is Your Business Ready for Business-Grade Wi-Fi?

business-wifi-social

In today’s business world, having great Wi-Fi isn’t a luxury -it’s a necessity. Businesses, with their varying needs, have personal requirements for what constitutes great Wi-Fi. For some small businesses, consumer-grade Wi-Fi may be sufficient, but many find that business-grade Wi-Fi is more appropriate. As companies grow, there becomes a tipping point where business-grade is necessary. So how do you know if your business is ready for business-grade Wi-Fi? Ask yourself the following questions to find out.

How many devices use your Wi-Fi?

It used to be that only desktop computers connected to your Wi-Fi, but that is no longer the case. With the rise of portable devices such as smartphones, tablets, and laptops, each person may be using your Wi-Fi from several devices. Consumer-grade hardware is designed for just a few people (like the amount that live in a single household) but can’t manage larger amounts of users and all of their devices. This is especially true for sustained usage. Remember that your employees aren’t the only people who expect to be able to connect to your Wi-Fi. One of the first things visitors typically do is look for a Wi-Fi network to connect their smartphones to.

What is the size and shape of your workspace?

The number of access points you will need for your Wi-Fi is dependent on the amount of physical space that needs to be covered, the shape of the area, wall material, and the number of users/devices. In smaller spaces, consumer-grade Wi-Fi is good enough. Larger, oddly shaped spaces benefit from business-grade. If your building’s walls are made of brick, cinder blocks, or cement, you likely need more access points than buildings made of other materials. Make sure you have a strong connection from all locations. It’s annoying to only be connected to Wi-Fi in certain areas of a building and find yourself in a deadzone a few steps later.

Access points for business-grade Wi-Fi tend to be more powerful and flexible. For example, some business Wi-Fi systems can transfer Wi-Fi devices from a crowded access point to one that is less busy. By doing this, everybody’s fast speed remains. If you foresee your range needing to increase, such as renting out more space, it’s easier to add more access points to business-grade Wi-Fi than consumer-grade. Businesses that anticipate scaling up soon are better off with business-grade Wi-Fi.

Do you want guests to have the same quality Wi-Fi as workers?

In households, where consumer-grade Wi-Fi is prevalent, all users share the Wi-Fi equally. In a home environment, if children are slowing down the internet with Netflix or video games, it’s not a big problem. However, a choked business Wi-Fi can cause a lot of problems. Business-grade Wi-Fi allows you network management. You can assign a designated amount of bandwidth to different users so they’re unable to clog the entire connection. You can allow visitors internet access without giving them unlimited access to the network.

How much does the internet affect your employees’ productivity?

For some companies, workers only use Wi-Fi for a few quick tasks. With these types of businesses, if the internet is slow, it won’t have a big impact on how much work your employees get done. Consumer-grade Wi-Fi might be a good choice. For other companies, there isn’t much people can accomplish if the Wi-Fi isn’t working well. The slower your employees work, the less money you make. Wi-Fi troubles can also lead to frustrated, unhappy workers. If fast internet is essential for people to complete their daily tasks, business-grade Wi-Fi is important.

Strong Wi-Fi is a necessity for all businesses. This is especially true for larger businesses that connect a lot of devices (from both employees and visitors) and have a big work area. Also for those where employee productivity depends on a strong connection. The goal is to keep your business-critical technology running smoothly. Consider carefully whether consumer-grade Wi-Fi or business-grade Wi-Fi is the best choice for your business.

Is your business’s Wi-Fi struggling? Give me a call at (828) 290-8237 to discuss a solution.

It’s Official: Your Business NEEDS to Use HTTPS

https-social

You may have noticed many business websites now have a green padlock in the address bar next to the letters ‘https’. Until recently, you’d only see that on shopping or banking sites, but it’s now become the expected norm for all business websites – even if you don’t ask people to log in or enter credit cards. Simply put, the ‘s’ in https stands for secure and means any data sent/received by the visitor is encrypted.

Clearly, it’s an essential feature for e-commerce sites, but why have all the info-only websites started using https too?

The New Google Rule

As of July 2018, Google will mark your page as insecure unless you’re using https. It’s a movement they started a few years ago to make the internet a more secure place by default. Since Google pretty much rules the internet search and increasing security is always a good idea, businesses have been gradually switching over. Without https protection, someone with access to your internet connection, whether from digital eavesdropping or hacking, could intercept the information. They could also place malware onto otherwise legitimate sites and infect innocent visitors. That’s why eighty-one of the top 100 sites online have already switched to https and a strong majority of the web is following suit.

The Browser Bar Says It All

In the same way a green padlock in the browser bar indicates a trustworthy site, you can expect non-https sites to be marked with a “not secure” warning. Previously, users had to click an information symbol to actively investigate non-secure sites. The shift to plain sight markers will be most noticeable on Chrome, however it’s expected that other browser developers will follow suit. Visitors may then be alarmed by landing on your site and seeing that the connection isn’t secure.

The fact that you may not be asking them to log in, enter personal details or payment is irrelevant. You may not be asking them to enter anything at all, but perceptions matter. Eventually that warning will be changed to an alarming red as Google declares war on unsecure sites. As the common understanding is that a warning = bad, you may get more visitors bouncing away within seconds or even contacting you to report that your site has a problem.

Boosts for Secure Sites

Google is taking its commitment to safe web browsing further by favoring https. That means the search algorithm is taking your site security into account, preferring to display results that it knows will protect users from hackers.  Since https status gets the nod, you may find yourself climbing in the ranking while other businesses scramble to catch up. It really is a win-win situation.

What to Do Next

In an ideal world, your site would have a secret switch on the back-end you could flick over and suddenly be https, but it’s a little more complicated than that. In fact, you may have already noticed some sites experiencing trouble with the migration. When the setup goes wrong, users don’t see your website with a little warning in the corner, they’re blocked by a full page error and offered a return to ‘safety’ (away from your site).

The easiest way to make the move to https is to contact your web developer, as they’ll be able to make sure you’re keeping Google happy and rolling in the green.

Can Private Browsing Protect You Online?

private-browsing-protect-online-social

1. Get a virtual private network (VPN)
VPNs aren’t just for business and downloaders now, they’ve gone mainstream. Once set up, it creates an encrypted connection from your computer to the VPN providers computer. The other computer could be in another city or another country. When you visit a website, it can only see the VPN computer – not yours. You essentially run around the internet pretending to be another computer, in another location. Since your connection is encrypted, even your ISP can’t see what you’re doing online, making your usage anonymous.

The downsides: Because your internet usage has to route through another computer first, your browsing and download speed could be affected. They can be tricky to set up and not all VPNs offer the same privacy levels (the better ones tend to be more expensive). Some websites may even block visits from people using VPNs, so you may end up switching it on/off as required.

2. Go incognito
Most browsers have a private browsing mode, each called something different. For example, Google Chrome calls it ‘incognito’, Microsoft calls it ‘InPrivate’. Before you take the name at face value, it’s a good idea to talk about how they define ‘private’. Unlike a VPN where you can dance around the internet anonymously, private browsing simply means it won’t show up in your browser history, or what you entered into forms. This feature is free, so you always have the option to use it, and it’s actually more helpful than you might think. Common uses include price shopping to reset sale timers and access local-only pricing and overriding usage limits on certain sites. Some sites use cookies to control your free trials and private browsing can help you get around that. For example, some news sites limit you to 5 free articles a month unless you pay. Private browsing can extend that trial quite easily!

The downsides: It can’t pre-fill saved passwords and it won’t help you type in the website name even if you’ve been there before.

3.  Think about who’s watching
While you might be naturally careful when using a public computer have you thought about who’s watching what you do on your work computer? Some workplaces have employee monitoring software that tracks all sorts of data, including taking screenshots of your desktop. It helps them create rules about computer usage but it may also provide them with evidence you’ve been breaking those rules. Stepping out to the internet cafe can be even more risky, as people can install keyloggers that record every keystroke, including your credit card numbers and logins. You’ll never know your activities are being recorded, even if you use private browsing.

The downsides: None. Awareness of the risks and the possibility of being watched ensures you’re more likely to use the internet safely.

While private browsing can help keep your internet usage under wraps, it’s not a magic bullet to cover all possibilities. Many people believe they’re invisible AND invulnerable while private browsing, a mistake they end up paying for. You’ll still need solid anti-virus and password habits to protect against threat, and to be a smart internet user who avoids suspect websites. Consider the options above as privacy-enhancing measures, not one-stop solutions.

Need help with your online privacy? Give me a call at  (828) 290-8237

5 Tech Travel Tips You Can Use

tech-travel-social

Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience. Here are a few tips to consider before you hit the road.

1.  Backup to the cloud
While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables
Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data
It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan
Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack!  While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory
Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day.  Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give me a call at (828) 290-8237.

Why Periodic Security Assessments Should Be Your New Normal

securityassessments-social

By now you know that building up your cyber security is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cyber security is something they can set and forget. Unfortunately, cyber criminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these problems, you’re able to proactively setup adequate protection before cybercriminals strike. It’s best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that would otherwise be missed.

Regulations change – Are you affected?
Many businesses are kept to strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and time frame. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. I can ensure your business is meeting the relevant regulations, diving deep to be certain you’re safe.

Security patches and updates are vital
It’s so easy to fall behind on your security patches, after all, it seems like there’s a new update every week and each one takes precious time to apply. Cyber criminals are targeting businesses running late, and it’s basically easy pickings for them. If you’re unpatched where it counts, it’s like inviting them in. When we conduct your security assessment, we can take a look at your history and see if your business has a robust patch plan in place and make sure you’re up to date. If there’s an issue that’s placing you at risk now, impacted you in the past, or will in the future, we’ll find it.

Viruses are always evolving
Just like the human variety, computer viruses are nothing to welcome into your workplace. They’re constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cyber criminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where you’ve had the most breach attempts and where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed
As your business has grown over the years (or shorter if you’ve experienced a recent surge), your entire setup has changed. More employees, expanded remote access, additional vendors, supplementary locations…the list really is endless. With each change has come a new risk, particularly if your security has been growing around you. It might be that your password policies haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cyber criminal would.

What to do with your assessment results
Once we’ve finished the assessment you have a benchmark for progress. You’ll know exactly what you need to do, how I can help, and perhaps most importantly, which actions take priority. Moving ahead, future security investments will be smarter as you focus on the high-payoff areas. You’ll also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call me at (828)290-8237.