The Top 5 IT Security Problems for Businesses

top-5-it-problems-social

Companies that suffer security breaches nearly always have one of these IT security problems. Is your company guilty of any of them?

No Backups

A shocking number of businesses are not backing up their data properly.  According to market research company Clutch, 60 percent of businesses who suffer a data loss shut down within six months.
Not only should every business be fully backing up their data, but their backups should be regularly tested to work too.  It’s a step that businesses miss surprisingly often. Many businesses don’t find out that their backup can’t be used until it’s already too late.

Reactive and not proactive

The world is constantly changing.  The IT world doubly so.  Attackers are always figuring out new ways to break into businesses, hardware evolves faster than most can keep up, and old systems fail due to wear and tear far quicker than we would like. A huge number of businesses wait until these issues impact them directly before they respond.  The result is higher costs, longer downtime, and harder hitting impacts.

By responding to hardware warnings before it fails, fixing security holes before they’re exploited, and upgrading systems before they are out of date: IT can be done the right way. Being proactive about your IT needs means systems don’t have to break or compromised before they are fixed.  The result for your business is less downtime, fewer losses, and lower IT costs.

Weak Passwords

A surprising number of people will use the password “password” to secure some of their most important accounts.  Even more still will write their own password on a post-it note next to their computer.  In some cases, many will even use no password at all. Strong passwords act, not only as a barrier to prevent unwanted entry, but as a vital accountability tool too.  When system changes are made it’s often essential that the account that made changes is secured to the right person.

With an insecure password or worse; none at all, tracking the individual responsible for reports or accountability becomes impossible.  This can result in both auditing disasters on top of technical ones.

Insufficient Staff Training

Humans in the system are commonly the weakest point in IT security.  Great IT security can be a bit like having state-of-the-art locks on a door propped open with a milk crate.  If staff aren’t trained to use the lock, it’s worth nothing at all.

Often times businesses can justify spending big on security for the latest and greatest IT defenses.  The very same firms may exceed their budget and spend almost zero on training staff to use them. In this instance, a little goes a long way.  Security training can help staff to identify a threat where it takes place, avoiding and mitigating damage, often completely.

Weak Data Controls

Some companies can take an ad-hoc, fast and loose approach to storing professional data.  Often crucial parts can be spread across many devices, copied needlessly, and sometimes even left unsecured. Client data can be found regularly on employee laptops, mobile phones, and tablet devices.  These are famously prone to being misplaced or stolen out in the field along with vital client and security data.
It can be easy for both employees and firms to focus on the costs of devices and hardware purchased for the business.

The reality is that the data held on devices is almost always worth many times more than the device that holds it. For many firms, their approach to data hasn’t been changed since the firm was first founded.  Critical data is often held on single machines that haven’t been updated precisely because they hold critical data.  Such machines are clearly vulnerable, outdated, and prone to failure.

Common problems with simple solutions
Each of these common issues have simple solutions to secure against IT failure.  With a professional eye and expertise in the field, every business should be defended against IT issues that risk the firm.

If you need help securing your IT to protect your business, give me a call at (828) 290-8237.

Is it Time to Retire That Program? Here’s How to Tell for Sure

retire-program-social

Your business has likely been using the same set of applications for some time. Perhaps since the day you started, a long time ago. While you’ve been replacing computers and devices regularly to maintain your competitive advantage, the standard installation has remained largely the same. The programs do the job and everyone knows how to use them, so why upgrade? In some cases, it’s completely fine to keep that legacy program.

However, there are some aspects you should consider:

Support Available
Occasionally, and more frequently with software from smaller developers, the author has moved on from supporting the program. Perhaps they’ve closed the business, sold it, or pivoted directions completely. Either way, they’re no longer interested in helping you get the best from the program. Every time your employees come up against a problem they have nowhere to turn and productivity takes a hit as they try and come up with a workaround. Meanwhile, you run the risk that it could suddenly stop working after a Windows update, begin clashing with other essential software, or even create gaping holes in your security.  As you are aware, even the bigger companies like Microsoft stop supporting software after a while, as they have with earlier versions of Windows. Having support available to both assist and protect is a huge asset to your business.

Hardware Compatibility
Imagine picking up a brand new computer and trying to insert a 5 ¼ floppy disk – that’s the 1980s retro square ones bigger than your hand – it doesn’t matter how effective that program will be, modern technology simply has no idea what to do with it. Thanks to the rapid advancement of computer hardware, you may find a simple component refresh leaves your legacy program completely incompatible. The latest CPU that’s supposed to speed things up suddenly brings your entire business to a standstill, purely because it’s too advanced. Many owners work around this by keeping some older systems running exclusively for that program, but as the classic hardware fails, you may find yourself struggling to find replacement parts or technicians able to install them.

Security Vulnerabilities
Broadly speaking, the longer a program has been around, the longer hackers have had to discover its weaknesses. It could be a flaw in the program itself, or in the operating system that runs it. For example, the application may only run on Windows XP, but Windows XP is one of the earlier versions that Microsoft has stopped supporting. As the older operating systems and programs aren’t being patched, cyber criminals pour more energy into finding flaws they can exploit. It’s open season in their minds, and a free ticket to all your connected systems.  It’s how hospitals across the UK found themselves infected with ransomware last year, simply because they were running programs with known weaknesses.

As it’s not always feasible to replace a program immediately, I can help you run it on a virtual machine. That is, running the older operating system or program from within another program. You’ll have increased security, an element of support and a strong backup system while you work to find a replacement program. These types of solutions are very specialized and resource hungry though, so let me know if you need help. The other option is to migrate to a new program that does what you want, and is supported, hardware compatible and secure. If you’ve been running the old program for some time, this may feel quite daunting at first. Before you rule it out, keep in mind you’ll also be gaining the benefits of faster software, more integrated processes and a highly flexible system.

Need to talk through your options? Give me a call at (828)290-8237.

5 Tech Travel Tips You Can Use

tech-travel-social

Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience. Here are a few tips to consider before you hit the road.

1.  Backup to the cloud
While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables
Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data
It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan
Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack!  While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory
Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day.  Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give me a call at (828) 290-8237.

Why Periodic Security Assessments Should Be Your New Normal

securityassessments-social

By now you know that building up your cyber security is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cyber security is something they can set and forget. Unfortunately, cyber criminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these problems, you’re able to proactively setup adequate protection before cybercriminals strike. It’s best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that would otherwise be missed.

Regulations change – Are you affected?
Many businesses are kept to strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and time frame. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. I can ensure your business is meeting the relevant regulations, diving deep to be certain you’re safe.

Security patches and updates are vital
It’s so easy to fall behind on your security patches, after all, it seems like there’s a new update every week and each one takes precious time to apply. Cyber criminals are targeting businesses running late, and it’s basically easy pickings for them. If you’re unpatched where it counts, it’s like inviting them in. When we conduct your security assessment, we can take a look at your history and see if your business has a robust patch plan in place and make sure you’re up to date. If there’s an issue that’s placing you at risk now, impacted you in the past, or will in the future, we’ll find it.

Viruses are always evolving
Just like the human variety, computer viruses are nothing to welcome into your workplace. They’re constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cyber criminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where you’ve had the most breach attempts and where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed
As your business has grown over the years (or shorter if you’ve experienced a recent surge), your entire setup has changed. More employees, expanded remote access, additional vendors, supplementary locations…the list really is endless. With each change has come a new risk, particularly if your security has been growing around you. It might be that your password policies haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cyber criminal would.

What to do with your assessment results
Once we’ve finished the assessment you have a benchmark for progress. You’ll know exactly what you need to do, how I can help, and perhaps most importantly, which actions take priority. Moving ahead, future security investments will be smarter as you focus on the high-payoff areas. You’ll also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call me at (828)290-8237.

What’s Best for Your Computer: Shut Down or Sleep?

power-off-social

Most homes are trying to reduce power costs by turning off lights and appliances, but do the same rules apply to computers? After all, it requires more than flicking a switch on your way out the door. Some people believe you should shut down after every use to save wear and tear, others believe you should never shut down your computer – ever. Others simply want to make sure the pages and apps they left open are still there waiting for them. So, who’s right and what are they really doing?

Back when computers were clunky behemoths that took a long time to start, you’d go nuts at the person who shut it down when it was your turn. If you have an older computer, maybe you still do.  Modern computers actually have two options for their downtime: Shut down or sleep.

When it shuts down, the system goes through and closes any open programs (often prompting you to save first), then gradually cuts power to all components. It’s a methodical process that seems quite fast to us but is actually made of 100+ intentionally ordered steps. If there’s a sudden blackout or you hold the power button until it turns off, it means the steps aren’t followed and damage is possible. The second option is to put your computer to sleep. This can be triggered by an automated timeout or a user click. Your system uses a special type of memory called RAM to hold all your running programs exactly as you left them but use minimal power. The hard drive stops spinning, the graphics card lets the screen go black, and even the system fan slows to become almost silent. When you wake it by moving the mouse or pressing a key, it ‘wakes’ again almost instantly.

Reasons to Shut Down

A switched off computer isn’t drawing power which is a tick for the environment. But shutting down is about more than saving power. It can sometimes give improved stability over a machine that’s been running for days/weeks. This is because every time you shut down, you give your computer a chance to clear out all temporary junk files it’s been carrying in memory. It also triggers various health checks on startup that may otherwise be missed, important routines like checking for updates or scanning for viruses. It’s certainly more convenient to spend an extra minute booting up than lose everything to a cyber-attack. For older computers or those under heavy strain like gaming or video editing, shutting down also provides a necessary chance for the components to cool down.

Reasons to Sleep

Speed is the big selling point here. You can literally sit down and start working where you left off without the delays of bootup, finding your program, opening your saved files, scrolling down… it’s all right there and ready. You can even tell it how long to wait before putting itself into sleep mode, just in case you get called away and forget. Windows updates still run in the background, so that’s okay, but it’s important to note that your computer might get stuck waiting for a reboot that never comes.  Those pending updates may stack up, ineffective until it either forces a reboot or becomes unstable enough that you give in to a restart.

The best method is….

Since the whole point of having a computer is that it’s ready to work when you are, I recommend shutting down at night at least once a week when it’s definitely not in use but using sleep mode during the day. Updates will get all the rebooting they need, memory is refreshed for the new day, and you’ll get the best of both worlds – speed and stability.

I can help your computer boot faster, give me a call at (828) 290-8237.

Got a New Device? Here’s the Essential Tech Prep You Can’t Afford to Skip

new-device-print-email

It’s tons of fun getting a new device. Whether it’s a new desktop, laptop or phone: the thrill of getting it home and opening the box is great. I know, I love tech too. It even has its own version of new car smell! Once you get it home though, there are a number of things that need to be done before it’s really usable – beyond snazzing it up with a new case or mousepad.

The sellers like to say it’s ready to use straight from the box – and it is – except not quite the way you need it to work. They’ll all turn on, look for wifi, and sure, you can type…but rather like when you buy a new fridge, simply turning it on isn’t enough – it’s still empty and you’re still hungry.  A few minutes now to prep your new device will save you time, stress, and quite possibly money.

Today, I’m talking vital tech prep for new devices:

Security Updates and Fixes

From the factory to your hands, that device has been in the box for at least a month. In the world of security, that’s an eternity. During that time on the shelf, new viruses have come out and new software weaknesses have been discovered. Fortunately, new updates to combat these problems were also created, they just haven’t been downloaded to your device yet. I can make sure your essential software is up-to-date and set to stay that way. That way, you know your device is safe to go online.

Data Transfer From Old to New

Some people want to transfer everything from one device to another, others like to have a fresh start and keep the old device as a backup. I can either transfer your data entirely or just the things you use. For computers, I can even turn your old hard drive into an external drive that you can plug into your new computer and grab files as required.

Setting up Hardware

If your new device is a computer, you’ll need to hook it up to extra tech like a printer or webcam. These tasks that should be plug-and-play can sometimes get complicated, especially when you’ve got a plug mismatch or incompatible drivers. I can help get you set up, with everything tested and working.

Setting up Email and Software

This is one people commonly forget and then struggle with. Email clients in particular, need special configuration to connect properly. Quite often, I find people are stuck only able to receive, with overflowing unsent mail that won’t go anywhere! I’ll get all your personal software and connections up and going.

Setting up the Network

While tapping in a wifi password is easy enough, it doesn’t mean your browsing is secure, or even as fast as it could possibly be. I can quickly determine which connectivity method will be best for your device and your needs, and hook you up with fast, robust security measures.

Lockdown Privacy & Permissions

Whether you have children and are looking to provide a safe online experience, files you’d prefer to keep private, or simply want to set up ‘profiles’ for each user to have their own login, I can quickly get your new device configured to meet your needs.
I love to help. Give me a call at (828) 290-8237 and I’ll get your new device up and running.

6 Simple Tips to Protect Your Customer Data

protect-customer-data-email

As cyber-attacks continue to make headlines, hackers are exposing or selling customer data files in record numbers. But just like with any threat, there are actions you can take to minimize risk and ensure your business retains a positive reputation among customers.

1. Stop using the same password on repeat. Set a mandate for all staff that passwords must be unique for each user and for your workplace. That means it can’t be remotely like the one on their home PC, tablet or online banking. Passwords are hacked more than ever, so when you’re prompted for a password change, dig deep and really think about what goes into a hacker-proof password. If remembering them is a problem, consider one of the latest password management tools.

2. Go on a shredding spree. How much sensitive data is being dumped into the recycling bin? Valuable customer data is often taken from the bins of small businesses and quickly sold or published. Take 5 seconds to run documents through the shredder or book in the services of a secure shredding company.

3. Ditch the accounting spreadsheets. Still using an Excel doc for all your number-crunching? Besides making your accountant’s job harder (and more expensive), you’re opening your business to a massive range of vulnerabilities. Even with password-protection, spreadsheets aren’t designed to safeguard your financials or those of your clients. Upgrade to a proper accounting solution with built-in customer data protections and security guarantees.

4. Train staff explicitly. You can’t rely on common sense because what you think is a given might be news to someone else. It can be extremely beneficial to hold special data-safety training sessions once or twice a year as a reminder, as well as take the time to induct new staff into the way things are done.

5. Limit access to data. Just like the bank manager who guards the keys to the vault, you can limit who accesses your data. Revoke employee access as soon as they leave your business for good, and set rules around who can access what – and when. Do they need access to sensitive information while working from home? Should they be able to change the files, or only view them?

6. Keep your software updated. Possibly the most preventable hack, having outdated software can be an open invitation for cyber-criminals. They look for known weaknesses in business software and waltz right in. While the nagging pop-ups and reminders to update can feel like a selling ploy, they’re actually helping your business to stay in the safe zone. Updated software gives you protection against new viruses and hacking techniques, plus closes off those nasty weaknesses.

If you would like to make sure your business is secure from data breaches, give me a call at (828) 290-8237.

Should I Upgrade or Buy a New Computer?

upgrade-pc-email

Well, it depends – mostly on who you’re asking! A department store salesman will always recommend a new one, but when you get down to the nitty gritty with a trained technician, you’ll often discover you have more (and cheaper) options than you thought.

Start by taking stock of what you’ve got. Sometimes an upgrade simply isn’t worth the trouble and it’s painfully obvious. For example, if your car is 30 years old, demands a constant supply of special fuel and you can see the road whizzing by thanks to the ‘custom’ holes in the floor…it’s time to replace the rust-bucket! However, if your car is decently modern and in reasonably good condition but happens to stall at stop signs, a few quick fixes can be just what the mechanic ordered.

If your computer does need to be replaced, chances are you already know this. But if you’re not sure and some days it could go either way, this will help. We’ve put together a walkthrough of the most common upgrades and the impact they’ll have:

Video card upgrade: It might not be your computer that’s getting old. Instead, games are getting more and more demanding. The days of stick-figure animations are gone and lifelike 3D is the new normal. With that improved experience comes a huge strain on your computer’s resources. If you have a gamer in the house, you can often super-power your computer with a single component – a new video card. For hardcore gamers, it’s actually a necessity, as some new games refuse to install if the video requirements aren’t met. Love smooth animations and responsive gameplay? I can match you with the right video card.

Hard drive upgrade: New hard drives are a popular option, both in size and speed. Running out of space is less of a problem now, but speed is a major concern. You’ve no doubt sat there twiddling your thumbs and urging a file to hurry up and copy. Many upgrades are to an SSD (Solid State Drive) that has zero moving parts and can find/transfer data in a flash. They even make booting up lightning fast! And you’ll have the choice of keeping your old drive for general storage, complete with all your existing data.

Memory/RAM upgrade: Some cheaper computers are underpowered from day 1. In truth, most of the ones in the department store could use at least an extra 4GB of RAM. Sometimes though, even a great computer falls behind as new applications come out and need more resources. Adding extra memory can revive your existing computer and set it up for a couple more years of happiness.

Where to draw the line: There are other upgrades such as the CPU, which is basically the brains of the computer; and the motherboard that all the parts plug into…but once you’re in that territory, it really is time to go for a full replacement. You’ll save money by getting a computer that meets your needs and can grow with you.

Is your computer letting you down? Give me a call at (828)290-8237 to help you with upgrading or selecting a new computer

Why is my Computer Running so SLOW?

slow-computer

Woah, who slammed on the brakes? Your computer used to speed through startup and let you open almost everything at once, but now it’s struggling to crawl along! Everything takes so much longer or crashes without warning. Something isn’t right. If it’s gotten so bad that you’ve found yourself drooling over the idea of a new computer, even though your system isn’t that old, I’ve got some good news:  you can get your speed back with a little TLC.

Computers generally start slowing down within 12 months, but it’s not usually because their parts are broken. And it’s not because they’re faulty. It’s not even because you have so many browser tabs open that you lose count. Slow computers have a number of causes, but the most common ones are easily fixed.

Background programs

Whenever your computer is turned on, it’s running programs in the background. You didn’t start them and they may not be essential to operation, but off they go anyway. You can’t even see some of them, they don’t have windows or anything to look at.  A good example is your antivirus program. You don’t need to see it all the time, but you know it’s running in the background, protecting you.

Over time, more and more programs might slip into the background and casually suck up your resources, like iTunes helper, Acrobat updater, Cortana listening, Skype or Spotify.  We can speed up your system by setting these background programs to run only when you need them, or remove them completely.

Application bloat

How do you improve last year’s version of a program? Add more features! The problem with this is the applications become bloated with features you may not need (or even know about), but that keep needing more and more resources. Each time the developers review their programs, they assume you’ve bought the latest and greatest computer and can run whatever they release.

This means a slow computer can sneak up after an auto-update. You may not even know the update happened, just that your computer is suddenly making you very unhappy. Eventually, your system grinds to a halt. You can remove unused applications or increase your computer power as required.

Slow hard drives

Your data is stored on a part called the hard drive. It’s usually a mechanical type that works like a record player, with a spinning platter and a ‘needle’ reading it. If your data is spread out across lots of places on the platter, the hard drive head ‘needle’ has to go backwards and forwards thousands of times just to retrieve a single file. Unsurprisingly, that takes more time to bring up your file. You can optimize your data to give the hard drive head a break, but an even better solution is to upgrade to an SSD. That’s a Solid State Drive that stores data in memory chips, like your USB drive, and has no moving parts. Without the physical need to move a hard drive needle, your computer can access data much faster.

Unfortunately, once your computers starts slowing, for whatever reason, the problem only gets worse. The background programs will continue to multiply, the bloat keeps coming, and the hard drive begs for relief.  Rather than buy a whole new system though, it’s completely possible for your current computer to go back to being lightning fast – and for a fraction of the cost.

Would you like me to give your computer a new lease on life? Give me a call at (828) 290-8237.

How Much Could A Ransomware Attack Cost You?

ransomware-pay

Have you ever thought about how much your data is worth? Information is possibly the most valuable part of your business – there’s your client database, accounting software and inventory management, and of course, any intellectual property you may own.

When ransomware hits, businesses are suddenly forced to re-assess the value of their data: is it worth saving, and what’s the deeper cost of the attack?

Most ransomware attacks cost $150-$600 to get your files released, but that’s only IF the cyber-criminals honor the payment and actually give you the decryption key. Meanwhile, new client calls are still coming in and you may find yourself unable to operate with your systems down. Paying the ransom or restoring from an unaffected backup seems like a quick fix, but it doesn’t end there. There’s still the downtime involved to restore all your data – possibly days – and that’s a lot of lost productivity.

Plus, if word gets out that your data has been compromised, you may find confidence in your business plummets and your existing clients head elsewhere.

Keep your systems up to date: Many ransomware attacks take advantage of a flaw in older versions of Windows, ones that have since been patched by Microsoft. But to be protected, businesses must be up to date with their patches AND be running a supported version of Windows. Delaying patches and updates puts your business at risk – I can help you update automatically.

Consider Locking down employee computers:

Very few staff require full administrator access to your business network. The higher their level of permissions, the more damage a person can do – either accidentally with a wrong click, or by inadvertently installing malware. By locking down your employee computers, you have a better chance of containing a malware attack to non-vital systems.

Educate your workplace:

Most employees believe they’re being cyber-safe but the reality is quite different. Many malicious links and embedded malware have become hard to spot in an instant – which is all it takes to click and regret. I can work with your staff to establish procedures around checking links for authenticity before clicking, awareness around verifying the source of attachments, and the importance of anti-virus scanning. I can help get the message through!

Have a solid backup plan:

When ransomware hits, a connected backup = infected backup. Unfortunately, synced options such as Dropbox immediately clone the infected files, rendering them useless. The only safe backups will be the ones both physically and electronically disconnected, with systems designed to protect against attacks like this. I can set you up with a backup system that protects your data.

Be proactive:

The best way to avoid the financial cost of a ransomware attack is to prevent it from happening in the first place. Smart businesses are the ones watching these widespread ransomware attacks from the sidelines, completely unaffected and seizing opportunities while their competitors are down.

I can help protect your business against the next cyber-attack. Contact me today by filling out the form on the contact page or call me at (828) 290-8237