We all now rely on technology. Our businesses rely on technology,
big or small. Our clients find us online and use the 10D Tech website. We store
confidential information and communicate via email. We download documents and
research and file forms online. We manage other businesses networks.
10D Tech IS a target for bad guys. WE know IT and how to
protect ourselves so that we can help our clients protect themselves.
Numerous reports reveal that more than half of all small
businesses are hit with a security breach. The financial consequences can be significant
and for many, devastating. Right out of the gate, you’ll have to pay to have
the systems recovered, get the data back, loss of reputation and potentially
loss of your clients.
Every organization needs to take responsibility and enable
security measures to protect their business as part of the monthly reoccurring costs,
like phone bills and rent. You can’t just set it up and forget it because the
attack protocols change daily. The
Hollywood version of fending off a hacker attack, with streams of data scrolling
across the screen is unrealistic. The image of a computer genius pounding away
on a keyboard like they are replying to a political Facebook post is just
comical. Most hackers are in a business network for 68 days before being discovered.
They sneak in through emails, phishing links and EBKAC (Error Between Keyboard
And Chair) The bad guys are good, really
good, BUT beatable with the right tools, properly configured firewalls and
staff training.
Here is the first of 7 important cyber security tips.
#1. Create a clear
set of security protocols.
How will you protect your business? Take some time and write
it out with your IT team (10D Tech). You know your business, the IT team knows
theirs. They’ll help you with the details for protecting your network, hardware
and client information. Don’t skimp here because the cost of a security
failure can close your doors.
Evaluation items you should regularly ask your IT Team:
- How often do you run system updates, patches and network scans?
- Do we need to protect and back up all of our data?
- Does the staff have access to all of our sensitive data?
- What software and applications are critical, and which are optional?
- Where does the buck stop? The one throat to choke or the one back to pat?
Review the security plan every 6 months, and remember to
include employee training in the security equation. Your cybersecurity plan only protects the
business if everyone knows it and follows it.
Next Tip: #2 Business Email Compromise (BEC) protection