Chat with us, powered by LiveChat
678-389-6200

What’s The Best Way To Switch IT Managed Service Providers?

The COVID-19 lockdowns have naturally changed how many organizations and companies operate. Educational institutions are embracing virtual classes, events that were previously held in person are now fully virtual, and a whopping 98% of employees worked from home to avoid spreading the novel coronavirus. Sadly, not all IT managed service providers were able to keep up with their customers’ needs during this challenging time, leading disaffected business owners to search for new IT managed services that can handle a company’s current and future IT challenges.

While finding a competent IT service is imperative, it’s also vital to know how to change companies without disrupting your current IT operations. The following are some expert tips that can help a company transition to a new IT service safely and smoothly.

Switch First

Don’t tear up your contract with your current IT managed service provider until you find another provider that can take their place. Furthermore, you’ll need your new provider to get to work on your IT set-up right away. Once your new IT service has everything under control, you can pull the plug on your former IT service.

What does this operation entail? Here are some steps you’ll need to take to make sure your business is ready to switch IT managed services:

  • Make sure you have all your login information and administrative access to all your accounts. Any decent IT managed service will provide you with this information even before you ask for it. Sadly, some subpar services try to hold onto your information to force you to continue to work with them.
  • Have your new company do a thorough cybersecurity assessment of your business to ensure there are no back doors that former IT technicians can use to gain access to your valuable company information.
  • Let your staff members know that you will be changing IT managed services by a specific date. Inform them of new protocols that will be put in place once you make the switch.
  • Schedule IT training sessions with your new managed IT service as soon as possible so your staff members can learn how to master new programs and cybersecurity rules quickly and easily.

What Does a Good Managed IT Service Look Like?

Selecting the right IT managed service provider to replace your current IT service is no easy task. Here are some tips that can help you make smart decisions.

  • Make sure the IT managed service is familiar with your industry.
  • Look up reviews online and ask prospective IT managed services to provide references from clients they have worked with in the past.
  • Ask about the pay structure. It should be a fixed monthly price, with allowance to scale services as the need arises.
  • Make sure the IT service can meet your future needs as well as your current ones.
  • Choose an IT service provider that puts a premium on cybersecurity services. Data breaches are becoming more commonplace than ever, with more than eight billion records exposed in the first quarter of 2020 alone.

Switching IT managed services can be challenging. It shouldn’t be done in a hurry; at the same time, you shouldn’t hesitate to find a new service provider if your current one is unable to meet your present and future needs. Do careful research to ensure your new provider is the best fit for your business, and start the transition process before notifying your current IT company that you will no longer use its services. Doing so will protect your business from disruptions while improving your IT efficiency and security.

Time to make a change? Interested in switching to an MSP? Reach out to us at 678-389-6200 or contact us online

Should I outsource IT to a Managed Service Provider?

Internal IT vs. Outsourcing IT: The Value of Outsourcing to a Managed Service Provider

The question of whether to outsource or rely on an internal IT team is common. Services that were once considered “nice to have” are now necessities – including machine learning, artificial intelligence, and cloud computing. While they add a lot of value to your business, they can be difficult to manage if you don’t have a reliable team of IT experts.

Outsourcing IT Services To An MSP

Why Outsourcing To An MSP Make Sense

While having an in-house team presents unique benefits, the value of outsourcing is unrivaled. Some of the reasons why it may be a better choice include the following:

1. Optimized Uptime and Consistency

Having an in-house team is a good idea, but how do you deal with issues after their working hours? Your in-house team has specific working hours. They may need to be away from work because of sickness or personal emergencies. Even the slightest problem could cost you days or hours of work. Outsourcing takes care of that problem. You can enjoy consistent and comprehensive IT support. Your MSP can handle issues as soon as they occur. They are available 24/7 and don’t need to take breaks. Your provider offers regular maintenance to promote peak efficiency.

With cybersecurity, consistency is critical. Most ransomware attacks happen outside regular working hours. If you rely on your internal team, you need to wait until the next business day to address them. MSPs, on the other hand, can keep your business safe while you are away.

2. Specialized IT Support

Your in-house IT experts may do their best, but they are unlikely to deliver the expertise you need to take advantage of modern technologies. As your business evolves, you may need to train them or hire a new team. However, the right MSP can cater to the needs of your business as it grows. With their help, your business can take advantage of the latest technologies.

3. A Variety of IT Skillsets for Your Company

Your MSP can provide you with a range of skillsets that are essential for successful network management. They can provide you with IT strategy and planning, cybersecurity, and cloud and mobile expertise. Finding members of an in-house team that have all of these skillsets is difficult, especially if you have a limited budget. The most realistic way to take advantage of all possible competencies is by working with an MSP.

4. Maximizing Productivity

Outsourcing is a smart way to free up some time for your team. They can focus on the core purpose of your business while your MSP focuses on IT matters. Your MSP handles issues that your in-house employees would otherwise waste a lot of time trying to resolve.

5. Safeguarding Your Institutional Knowledge

If you choose to work with an in-house team, you may need to spend a lot of time and money training them. When they leave your company, they take all your institutional knowledge with them. The IT industry is competitive, and your former employees are likely to share what they learned from you with their new organizations. With an MSP, you don’t need to go through the trouble of hiring, training, and rehiring staff members. They are a long-term partner that gets you through all the stages of growth.

6. Saving Money

Working with an MSP may be cheaper than hiring an in-house team. It cuts out the cost of training and hiring employees. With MSPs, your business can have less downtime and improved productivity.

The benefits of outsourcing IT services outweigh the advantages of working with an in-house team. The most outstanding ones include safeguarding your institutional knowledge, improving your productivity, 24/7 support, and specialized IT support.

Interested in switching to an MSP? Reach out to us at 678-389-6200 or contact us online

What Is Two-Factor Authentication?

Protect Yourself – Use Two-Factor Authentication for Your Business

Two-factor authentication is something every business should be using to protect themselves and their customers. You know the value of adding layers of security to your business – if you have a brick and mortar operation, you probably have a lot more than a simple lock on your front door. Security cameras, alarms, barriers, and more are common for most businesses because one layer of security is never enough.

The same is true for online security. Two-factor authentication gives your business and customers another layer of protection beyond the standard password – so why not use it to improve your security?

What is Two-Factor Authentication?

You’ve probably already encountered two-factor authentication as you navigate the internet for personal or business reasons – all the major tech companies like Google and Facebook are using it because it. The process of two-factor authentication goes something like this:

  1. Input your username and password. Two-factor authentication starts off just like your standard security measures. You input your username and password for the site you are trying to access or the app you are trying to use. This is the first step of the authentication process, the first factor.
  2. Provide a second factor to authenticate yourself. Here is where two-factor authentication becomes special. It asks for you to provide a second factor that is much harder for hackers to mimic. For example, it might ask to send an authorization code to your smartphone or ask for your fingerprint to verify your identity. Hackers are much less likely to have these available to mimic you and try to access your account.

You have definitely encountered the older way to verify your identity – security questions. But over time, security questions have become less and less effective at protecting your information. Most security question answers can be found on your social media account, after all. Hackers can spend just a little time doing some research to find all the answers they need, particularly if they have already stolen your password from another site.

How to Use Two-Factor Authentication in Your Business

You can easily implement two-factor authentication into your current business security efforts – both for your employees and your customers. There are multiple ways you can use two-factor authentication, including:

  • Text Messages (SMS). Most people prefer to use SMS to verify their identities over the other methods listed below because it is so easy to check your text messages and access the authorization code. All the user needs to do is log in with their username and password, then receive the code through SMS and type the code into the verification box. The only drawback to this method is that if the user loses their phone they can’t authenticate.
  • Email. You can also allow users to send their verification code to their email. They need to be able to access their email – which usually isn’t a problem – but if they can’t this method would not work. The other problem that can come up with emails is that they can sometimes get caught in spam filters and never arrive at the person’s inbox.
  • Phone Call. While this option is not used nearly as often as the two above, it is a possibility depending on the system you are using. The user can choose to get a phone call which will use text to speech to deliver the code they need to log in.
  • Tokens. Some companies find it easiest to give employees tokens, either hardware tokens like key fobs or software tokens through apps, that can then be used to provide the second factor in the authentication process.
  • Push Notifications. It is possible to get an app that will allow users to receive push notifications so that they can authenticate their accounts. They get the notification, then click yes or no to authenticate.

Two-factor authentication is possible using a variety of methods – the most important thing is that you start using it to begin with. Whichever authentication method you choose, your business and your customers will be more secure as a result.

Need help setting up? Reach out to us at 678-389-6200 or contact us online

Protect Your Team From Coronavirus Phishing

How to Protect Your Business From the Surge in Phishing Websites

As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line their pockets. Google reports that there has been a 350% increase in phishing websites in the last two months alone. This threat is genuine, and you need to take steps to protect yourself, your business, and your data.

Coronavirus Phishing

What Is a Phishing Website?

Phishing websites are designed to steal your information, but they can work in a variety of different ways. For instance, a cybercriminal may make a website that looks like your bank site. You think the site is real so you enter your username and password, and then, the criminals have everything they need to access your account.

Similarly, a phishing website may look like it’s for a charity helping people with the coronavirus. In fact, it’s just a scam designed to steal money and credit card information. In some cases, phishing websites download malicious files to your computer when you visit them — once executed, these files may encrypt your data until you pay a ransom, copy all your keystrokes, or steal information from your computer in other ways.

Rise in Phishing Websites During the Coronavirus

In January, Google reported that it knew of 149,000 active phishing websites. By February, the number almost doubled to 293,000. As the virus began to take hold in the United States in March, the number increased to 522,000. That’s a 350% increase since January.

During the coronavirus, the most significant increases in phishing sites have happened during the most stressful times. The most significant day-over-day increase occurred on March 21st, the day after New York, Illinois, and Connecticut told their residents to shelter in place. The second-biggest increase? March 11th, the day the World Health Organization declared the virus as a pandemic. Both of these days saw about a threefold increase.

Unfortunately, no one is immune — one survey indicates that 22% of Americans say they have been targeted by cybercrime related to COVID-19.

Critical Strategies for Protecting Yourself From Phishing Websites

To protect yourself and your business from phishing websites, you need to take a multi-pronged approach. Keep these essential practices in mind:

  1. Educate your employees about the risks of phishing websites. Send out a newsletter, set up a training session over videoconferencing, or find another way to talk with your employees about how to protect your business from phishing attacks.
  2. Don’t click on links in emails from unknown senders. A lot of cybercriminals use phishing emails to direct users to their sites. If the email appears to be from someone you know, double-check the sender, and consider reaching out to them directly before clicking on any links.
  3. Invest in quality cybersecurity tools that block malicious websites, prevent your computers from executing approved applications, or protect your network in other ways.
  4. Be aware of the signs of a phishing website. These may include misspelled names of companies or charity organizations or forms that ask for information you usually don’t provide. For instance, a phishing website trying to steal your bank details may ask for your username, password, and PIN, while your bank’s actual website only requests your username and password.
  5. Advise your team to be selective about the websites they visit. Ideally, if they are searching for information on the virus or trying to donate, they should go to sites that they know and trust, rather than going to unknown websites.
  6. Work with a cybersecurity specialist. They can help you safeguard your network, which ultimately protects your money, your data, your business, and your reputation.

To stay as safe as possible from cybercrime during the coronavirus, you need to be aware of the heightened risks. If your team is working remotely, your network is likely to be even more vulnerable than usual.

To get help protecting your team, reach out to us at 678-389-6200 or contact us online

Hackers Target Zoom Meetings For Cyber Attacks

Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform

The Zoom platform has increasingly has been the target of hackers exploiting the vast numbers of users working from home. As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. According to MarketWatch, the company’s daily active user count was up 378% from a year earlier, as of March 22,

How Are Hackers Exploiting the Zoom Platform?

For many exploits, it starts with a website.

According to Check Point, more than 1,700 domains have been registered using the word zoom in the first three months of 2020. Many of those domains point to an email server, which can indicate the site is part of a phishing scheme.

Remote workers may receive seemingly official meeting notices using the Zoom platform. Hackers ask recipients to head to a login page and enter their corporate credentials.

It’s a perfect storm that’s playing into the hands of hackers. It also means companies need to be vigilant in helping users understand how to access and use the platform and other tools used in this paradigm shift of how work is done.

“Zoom users should be aware that links to our platform will only ever have a zoom.us or zoom.com domain name,” a spokesman noted. “Prior to clicking on a link, they should carefully review the URL, being mindful of lookalike domain names and spelling errors.”

What Is Zoom Doing to Protect Users?

Zoom has had to take several steps recently to address security concerns related to its dramatic usage growth. The company has increased its training sessions and reduced customer service wait times. Here are several of the other issues that Zoom has addressed:

  • Zoombombing: Multiple incidents of “Zoombombing” have arisen in recent weeks. According to NPR, “…intruders hijack video calls and post hate speech and offensive images such as pornography. It’s a phenomenon so alarming that the FBI has issued a warning about using Zoom.” That’s led to wider use of passwords, waiting rooms, and muting controls. Never post a public link to a Zoom meeting.
  • Windows 10. The company has addressed an issue that affected those using Zoom’s Windows 10 client group chat tool. If participants used the tool to share links, the Windows network credentials of anyone who clicks on a link were exposed.
  • Facebook Interface for Apple Devices. Zoom removed Facebook’s software developer kit from its iOS client to prevent it from collecting users’ device information.
  • Privacy Issues. The company removed features, including the LinkedIn Sales Navigator app and attendee attention tracker, to address privacy concerns. It also issued updates to its privacy policy.

The company announced it was freezing all feature enhancements to redeploy software engineers to focus on what it calls “our biggest trust, safety, and privacy issues.”

How Can You Protect Zoom Users from Cyberattacks?

Here are some tips to ensure that Zoom users are protected:

  • Use password features to require meeting attendees to log in before being allowed access.
  • Update the software. Upon finishing a meeting, the software will check to see if an update is necessary
  • Encourage managers to use the Manage Participants section features, which can control the use of users’ microphones and cameras. Sharing restrictions are also a good practice.
  • Be careful about recording meetings. The recording sits in a file, either online or the host’s computer, and could be stolen.

Cybersecurity is a sad reality in these turbulent times. However, a focus on prevention and detection are important deterrents to cybercriminals and can reduce the risks to your business.

For more, call us at 678-389-6200 or contact us online

Remote Workforces Deliver Business And Employee Benefits

When considering the employee and employer benefits of working remotely, businesses are wise to change. The alternative could make your outfit less competitive.  

To put into perspective how radically our culture has changed, try this exercise: pick up a pencil and a piece of paper and write out a half-day’s worth of emails rather than send them electronically. You’ll probably get a cramp in your hand, and what’s more, your productivity will tank.

Remote Working Coronavirus

At first blush, the exercise demonstrates our reliance on electronic devices and real-time communication. But on another level, it shows that thought leaders are wise to embrace technological advancements as they emerge. Remote workforces rank among the more innovative trends of the business landscape today.

“To remain competitive in today’s work-from-anywhere environment, companies will need to invest in responsive technology infrastructure and enhanced virtual collaboration tools, as well as training and tailored performance management and incentive strategies for remote workers,” says Emily Rose McRae, director of HR at the Gartner Research Group.

This shift away from in-house staff to people working from home or on the road once earned mixed reactions from industry leaders. But the COVID-19 pandemic has prompted businesses across the globe to find a way to have employees work from home until the health crisis passes. Employers and employees alike are discovering this advancement could be mutually beneficial.

Mutual Benefits of Remote Workforces

The health crisis has motivated businesses to shift to Cloud-based systems as a short-term measure. But HR departments may want to take the opportunity to scan the workforce landscape, because work-from-home expectations are expected to surge and affect hiring in the near-future.

“By 2030, the demand for remote work will increase by 30 percent due to Gen-Z fully entering the workforce,” says Gartner. “Organizations without a progressive remote-work policy will be at a competitive disadvantage for attracting and retaining talent,” according to Gartner.

Here are the reasons why the global trend toward remote productivity is well-received by management and staff:

  • Commute & Stress Reduction: No one can dispute the fact that commuting to the office adds unpaid work hours. Sitting in traffic or being packed into commuter rails tends to be an unpleasant way to begin and end each day. Employees and employers share this stressful routine. Remote work platforms such as the Cloud and Microsoft Teams allow all parties to sit down with a morning beverage and log on from anywhere. No hustle, no bustle, no extra hours, and no commuter expenses.
  • Talent Without Borders: Before the massive cellphone footprint, people used landlines with rotary dialing, and long-distance was expensive. In those days, it was common to pay a premium just to call someone in the next state over. But just as your cellphone can connect you to people far outside your region without added expense, so can the Cloud. When projects are conducted in Microsoft Teams via a Cloud-based network, your remote talent pool expands exponentially. A skilled person 1,000 miles away can secure a job they are qualified for, and employers gain access to talent otherwise unavailable.
  • Reduced Infrastructure: An increasing number of organizations that do not necessarily require a brick-and-mortar footprint. These outfits can eliminate that cost in some cases. Other operations can reduce office space expenditures. With remote workforces, less can be more.
  • Live-Work Lifestyles: Millennials and the Gen-Z crowd tend to see work and life more closely aligned than previous generations. Offsite positions allow employees a preferred professional lifestyle.

To stay competitive, industry leaders may want to consider the long-term benefits of embracing remote workforces. For help setting up your Cloud system, call us at 678-389-6200 or contact us online

Business Continuity For Uncertain Times

It’s always a good idea to have a business continuity plan in place, especially in the midst of an epidemic like COVID-19.

If it becomes necessary for your employees to work from home – either due to a government order or your own determination that it’s what’s best for the safety of your employees – you need a plan in place so that your business can continue to operate at the highest functionality possible. The time to make such a plan is now.

According to ready.gov (the disaster-preparedness site from the Department of Homeland Security):

The ability to run both office productivity and enterprise software is critical. Therefore, recovery strategies for information technology should be developed so technology can be restored in time to meet the needs of the business. Manual workarounds should be part of the IT plan so business can continue while computer systems are being restored.

In order to enable your employees to work remotely, be sure your team has access to the following:

  • Cloud-enabled applications and systems
  • Reliable internet connection
  • Work cell phones
  • Computer with all relevant applications installed and up-to-date (Office, CRM, etc.)
  • Access to a messaging service like Slack, Microsoft Teams, etc.
  • Business VoIP (voice over internet protocol) system

Need help making sure your team is ready to work remotely? Call us at 678-389-6200 or contact us online

7 PC Myths Costing Your Business Money

Evaluating your business technology budget? These 7 PC myths could be costing you a lot of money. From slow computers to hacker vulnerability, see how to fix it.  

Slow Computers

Think you’re saving money by keeping those old PCs running in the office? Think again. An Intel study found that using a business PC that’s older than five years costs the business nearly $700 a year in repair and maintenance costs alone. What other costly PC myths are draining your technology budget?

Myth #1: A Slow Computer Has a Virus

Slow computers are productivity killers. If you have slow PCs, studies show that the average employee loses 40 minutes a day due to downtime. That’s on top of 29% reduced productivity due to slower processing.

For many years, office workers have proclaimed, “it’s got a virus”. But the truth is there are many reasons that computers slow down over time. And your technology solutions partner will have many troubleshooting techniques in their tool belt to speed up slow work stations.

So if the virus scanner turns up nothing, know that you have options. Here are just a few things you can try:

  • Clearing caches and history
  • Rebooting if you haven’t rebooted for a few days
  • Closing programs and re-opening (not a good long-term solution)
  • Reducing the number of start-up programs
  • Checking for conflicting malware protectors

Myth #2: Macs Don’t Get Viruses

Who knows where this one started? Truth is, Macs are just as susceptible to malware as PCs. Whether you’re a Mac business or a PC business, you need a comprehensive cybersecurity strategy.

Myth #3: Letting Your Battery Run Down Before Charging to Extend Battery Life

This was true on older devices. Leaving a laptop docked on a charger would kill the battery life.

But if you have business laptops, tablets and phones that are less than five years old, this is no longer the case. Devices with lithium-ion batteries do not suffer this fate. On top of that, Microsoft, Apple and Android now use machine learning to track charging habits and avoid straining the battery.

Myth #4: Our Business Is Too Small to Be Targeted by Hackers

Actually, over 50% of cyberattacks happen to small businesses. They’re often less prepared. And they may be complacent, thinking what are the chances they’d attack us?

Most cyber attackers don’t go for the big score. Attacking 10 poorly protected small businesses versus one better protected medium-sized business will yield a higher ROI for the hackers.

Myth #5: Consumer PCs and Business PCs Are Interchangeable

This is especially untrue now. With so many people doing most of their computing on their phones, home computers haven’t needed to advance much beyond the technology of 10-15 years ago.

Instead, manufacturers have focused on the business market, where businesses demand faster processing and greater capabilities. For this reason, the fact is, if you’re buying PCs for business, make sure they can handle business computing.

Myth #6: RAM Is All That Matters

RAM, random access memory, is important for speed. More RAM means less buffering. But a computer is a lot more than RAM. It has an advanced CPU (processor) that uses that RAM most efficiently.

Otherwise, your computer is just a lot of muscle without the brains to use that muscle wisely.

Myth #7: No Need to Replace Computers that Still Work

We already mentioned how much time employees waste on slow computers. That payroll waste and downtime isn’t the only thing you need to worry about when trying to use computers beyond their shelf life of up to five years.

Older computers are also more susceptible to viruses. Eventually, they can’t support current operating systems. Microsoft stops supporting older OS after a while, leaving them open to attacks.

Newer operating systems often also have better productivity tools that streamline business operations. And they’ll work more effectively with new programs you want to install.

For more on keeping your technology up to date and secure, call us at 678-389-6200 or contact us online

 

Modern Phishing Email and Article Headlines That Fool Even Tech Professionals

Learn more about the kind of email phishing headlines that end up fooling the smartest tech professionals, and how you can better protect your business.  

Phishing Headlines

Any tech professional worth their salt understands the damage wrought by unsuspecting users clicking on links inside “phishing” emails. It’s not surprising when tech-challenged individuals end up getting sucked in by today’s social engineering attempts. However, some of the headlines used by hackers manage to fool a lot of experienced IT pros.

Emails aren’t the only place where tech professionals show their vulnerability. Messaging portals in spaces like Facebook and LinkedIn have become prime targets for scammers, especially as traditional email providers step up their protections. In fact, both platforms had the highest success rate for phishing scams when they were included in an email subject line at 28% and 55%, respectively.

How Do Experienced Tech Professionals End Up Getting Fooled?

It’s hard to imagine how the people charged with keeping company systems safe end up ensnared in these schemes. Security-minded individuals become so comfortable in their knowledge of suspicious emails and technology in general that it makes them less careful. They’re prone to quickly scanning and clicking emails and messages without absorbing the information. It’s already too late by the time they realize their error in judgment.

What Makes a Phishing Headline Successful?

Phishing email headers that include words like “Request,” “Follow-Up,” and “Urgent/Important” tend to have a higher click rate, especially if it seems they come from a colleague or high-level executive. Victims often feel compelled to respond quickly out of fear of not delivering on job expectations. They also worry about costing the company money by failing to follow through on requests related to finance and payments.

The manipulation of that social element can have the same effect on tech workers. They’re more likely to respond quickly to a request that seems to come from a company vice-president. No one wants to be the person preventing them from getting back to company business.

Let’s look at some of the headlines used to fool regular users and IT professionals.

  1. Requests for password changes
  2. Deactivation of Microsoft Office email service
  3. Setting up employee raises for HR
  4. Document sharing using a secure server
  5. Lack of internet service due to scheduled server maintenance.
  6. Address needed for FedEx delivery
  7. Locked company Twitter account
  8. Complete steps for Google service
  9. Error with Coinbase
  10. Closed company bank account

How Can Businesses Upgrade Their Current Phishing Protections?

There’s no one step a business can take to prevent someone from falling for a phishing scam. It pays to use a multi-pronged approach to blocking and dealing with suspicious emails and websites targeting company workers.

Tools like SPAM filters, mock phishing practice scenarios, and web filters to block malicious websites should be a priority. It also pays to encrypt sensitive company information, making it harder for employees to share the data with anyone. That goes double for telecommuters who must log into company systems remotely from different devices.

Businesses should initiate company-wide security initiatives and enforce them consistently. Make sure IT employees understand – their expertise doesn’t leave them immune to these types of attacks.

For more on keeping your network secure, call us at 678-389-6200 or contact us online

Five Golden Rules For Data Privacy

Your data and privacy deserve respect. Here are five golden rules for keeping yourself, your business, and your employees secure.

Limit Who Has Access

Keep information on a need-to-know basis. The more people that have access to a particular folder or file, the greater the risk of a data breach or exposure. Your employees should only have the information they need to perform their work.

Use Secure Passwords and Multi-Factor Authentication

If your business uses easy-to-guess passwords or doesn’t have rules in place regarding password complexity and expiration dates, it’s time to make a change. Implement your own rules and requirements for password management, or use a management tool that provides effective security while simplifying the process for your employees. Multi-factor authentication (MFA), which can be enabled via SMS or email, is an added layer of protection.

Implement Consistent Backups

Your data isn’t safe unless it’s backed up. Back-ups protect valuable information from accidental or malicious deletion and overwrites, hardware or software failures, and even cyber attacks. Backups should happen as often as makes sense for your business’s needs – but more often is better. And follow the rule of three: Three copies of data, on two types of media, and one offsite storage facility.

Protect Your Physical Space, Too

Picture an average workstation: Passwords written on sticky notes, USB drives sitting out in the open, unattended or unlocked computers displaying sensitive information. If your offices feature these common oversights, educate your employees about the simple steps they can take in their physical space to secure your company’s data and privacy.

Stay Informed

As technology rapidly evolves, so do threats to your business’s data security. Stay vigilant, stay informed, and use an IT provider that has your back. For more on keeping your business secure, call us at 678-389-6200 or contact us online

 

Web Analytics