How to Reduce Reliance on Tech Support
Updated: Dec 21, 2020
Yes, people like us!
Indeed, we are a tech support company, but our primary mission is partnering with you to keep you safe, your systems in top shape and prepared for the unexpected. If we do our job well, it means your business should need Tech Support far less frequently.
Here are our best practices for protecting your data from cyber criminals and hackers. Small companies (under 100 employees) are ideal targets because they normally have weaker technology protection and lack of resources to properly protect their digital assets.
A firewall is a network security device (or software) that monitors incoming and outgoing network traffic and decides whether to allow or block it, based on defined security rules. If you address nothing else, implementing a firewall is perhaps the single most effective thing a small business can do to decrease their risk of attack. It’s also a good idea to ensure employees who “work from home” and connect to your network also employ a firewall. Recall, your network is as strong as its weakest link.
Replacing passwords with “pass-phrases” is a great way to get employee buy-in to security protocols and more importantly, reduce the chance of getting hacked because of a weak password.
Ideally your pass phrase should include:
At least five words mixed with numbers and special characters
At least 19 characters
Something personal and easy to remember
And your pass phrase should never include:
Famous or well-known song lyrics or sayings, movie lines or book titles
Do not use anything easily found in a book of quotations, an online quotation compiler, or that can be easily googled.
VPN (Voice Private Network)
Thanks to technology like high-speed Internet and mobile phones, working from home is increasingly easier.
As more companies offer flexible commuting policies the remote job market is spreading beyond the traditional fields of computer technology or customer service. Under the right circumstances employees can prove more productive when given flexibility and employers enjoy lower overhead. Many small businesses allow employees to access their company e-mail or network resources from their personal devices. Open Wi-Fi networks, increasingly found at restaurants, coffee shops and transportation hubs, are an ideal place for hackers to plant the seed for future entry. It’s only a matter of time before an employee makes a mistake that compromises your company network and data – or worse, your client’s data stored on your network! Adopting a software tool, such as Virtual Private Network (‘VPN”) app for mobile devices can significantly help to lower the risk of cybercrime when an employee uses a public Wi-Fi. Using multi-factor identification is another tool that, while a bit inconvenient, can offer a much higher degree of security and provide an extra layer of protection that just may make the difference.
Back up Data
One of the most critical elements to business security is a properly configured, maintained and validated backup system in place that covers all essential data required to operate the business. Whether defending yourself from the ever-growing ransomware attacks or recovering from a natural disaster; a backup is the best means to protect your company’s ability to continue operations. When determining what to backup, think about what’s needed to run the entire business from scratch. If the business were to relocate today, what data is critical to launch? Once it is understood WHAT to backup, the next step is HOW to securely back it up. A local backup is a good start, but if damage affects the site, it may prove useless. If a ransomware attack encrypts data, this may extend to a local backup. The safest way to ensure business continuity after a disaster or ransomware attack is to backup off-site, such as the cloud. Setting a schedule for daily, off-site backups ensures a reliable copy of your data, but more importantly, a means to keep your business operating while everyone is figuring how to address the disaster or cyber breach.
Our team is constantly testing to identify the latest security challenges, changes and best practices to keep you safe and informed. Contact us.