Keeping Security Top of Mind in 2018

hackers and security

We continue to see the same trend when it comes to security and the perception of it in the past few months.  A percentage of organizations are taking it very seriously and some continue to think it does not pertain to them for many reasons.

We all need to start thinking differently about security as this is no longer a passive responsibility.  It is an ongoing challenge that needs a strategy as it is an ever-changing world.  Secondly, as a whole, we are aggregating a tremendous amount of data compared to 10 or even 5 years ago.  It is no longer just customer and vendor data we are storing but employee data, personal data of customers, credit card data and more.  With more data comes more responsibility to protect that data. Here some tips to get the ball rolling, however, an overall strategy that is revisited yearly is essential:

  • Strong Passwords across all systems, changed them routinely and kept confidential
  • Implement a patch management system that installs updates for windows, adobe, chrome and any other common applications
  • Have a documented security program that includes policies for acceptable data use, BYOD, incident response and other policies.  ** Ensure this is communicated and reviewed yearly **
  • Ensure email, Wi-Fi and remote access are all done under secure connections
  • 3-2-1 Backup:  Have 3 copies of your data, ensure that these backups are on 2 different media types, and ensure at least 1 of these backup sets is located offsite.  This is critical for when something does slip through the cracks to limit the time to restore information.
  • Have a Disaster Recovery Plan, keeping in mind the timing you need for your business to survive. What is your timing in terms of “return to operation”?  How many days and/or hours can you tolerate being without your systems before it affects you from a true loss standpoint?
  • Implement a vulnerability scanning tool that can let you know if there are holes in your network

Securing your systems is ongoing, everlasting activity. The world is different these days and by protecting your digital resources, you are protecting your business and employees.

Posted on January 6, 2018. Categorized as . Tagged as , , .

Related Insights

What is vulnerability scanning?

March 29, 2023

Just because you’re not using an application doesn’t mean it’s not vulnerable. Vulnerability scanning is a platform that will look for weaknesses on the systems and hardware that live on your network…. Read more

Is your classic Antivirus Software Protection enough for today’s threats?

March 8, 2023

Endpoint Detection and Response is a next-generation tool similar to Antivirus (AVP) but uses AI features to detect threats on your system and recover from them. This software may also include a… Read more

Why you should off-board former users immediately

November 30, 2022

Why should you off-board users as soon as they are no longer with your organization? This is a very important process that helps keep your company assets secure from unauthorized access. It… Read more

Request More Info

Get in touch and determine where managed IT services fits with your business.
Request More Info Mini

Stay Up to Date

Get valuable technology and security insights sent directly to your inbox.
Mailing List Sign Up