31 results found
- IT Security Tip: Make THIS password different from everything else
You know you’re guilty of it: using the same password for everything, which is a sign of very weak IT security. It is also one of the most common culprits for enabling cyber criminals to easily access all of your data. Believe me, I understand how annoying it is to try and remember all those passwords; and if you’re using the same password for sites that don’t share sensitive information, like a login to a news feed you like to read, then it’s generally okay. HOWEVER, the ONE password you want to keep unique is your e-mail password. If an e-commerce site you’ve registered at or bought from gets hacked – and you’ve used the SAME password you usually use for everything to register at the site – you can pretty much bet hackers are going to gain access to your in-box. They’ll have your e-mail and your password to the e-commerce site and will use that to hack in. From there, they’ll have fertile ground for getting all your data and other passwords. If you are an SMB Manager or Owner, you should know that IT security has been more compromised than ever before since the start of the COVID pandemic. Increased remote workers with poor IT security in place while outside the office, has meant even greater opportunities for cyber criminals, hackers and those looking to take full advantage of weak IT security. In addition to this, if YOU aren’t giving IT security the attention it deserves, how do you think your CLIENTS would feel about that? If for no other reason, you need to do it to protect your clients’ data, even if the only information about them you store is an e-mail address. If YOUR systems gets compromised, hackers will now have access to your CLIENTS’ e-mail and can use that for phishing scams and virus-laden spam. I’m sure your clients want you to be a good steward of their information and privacy, so stop lying to yourself and get serious about putting essential security practices in place. Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” You can get our free report on 'The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind' today by emailing email@example.com! You will learn the most common ways that hackers get in and how to protect yourself today. You can also download our free report here now!
- IT Security Tip: If you’ve ever said this, you’re asking to be hacked!
Do you believe it's only huge corporations that are the targets of IT Hackers? What do most small or medium sized business owners and managers believe about their own risk in terms of their IT security? ''We're too small....nobody would want to hack us.'' It is this very attitude and the number 1 reason why people (companies) are victims of hackers. It is why their own and their client's data is stolen. One thing is for certain: NO ONE and no business is immune to cybercrime or IT hackers. In fact, one in five small businesses fall victim to cybercrime and that number grows every year. Plus, half of all cyber-attacks are aimed at small businesses BECAUSE they make themselves low-hanging fruit with sloppy or non-existent IT security protocols. The attitude that 'it won't be me,' or to save a few pennies in the short-term often has disastrous consequences in the long term. Indeed, it could potentially sink your business. And one more critical point to ponder: If YOU aren’t giving IT security the attention it deserves, how do you think your CLIENTS would feel about that? If for no other reason, you need to do it to protect your clients’ data, even if the only information about them you store is an e-mail address. If YOUR system gets compromised, hackers will now have access to your CLIENTS’ e-mail and can use that for phishing scams and virus-laden spam. I’m sure your clients want you to be a good guardian of their information and privacy, so stop lying to yourself if you are taking risks with your business by having poor or no IT security measures in your business. Now is the time to get serious about putting essential security practices in place. Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! You can learn more here about IT security and what you should be doing or your IT consultant should be doing to protect your business. If you are unsure or would like an independent review of your IT security and how well your systems are being protected (or not), you can click here to fill out our brief form to get your free cyber security risk assessment for your business, if you are interested in having an independent review of your IT security.
- How to choose the best Small Business IT Support
Small Business owners and decision makers are increasingly discovering how important cost effective small business IT support needs to be for the success of their business. This means that trying to manage IT needs internally in a proactive way that prevents problems is difficult, if not impossible for most small businesses. Outsourcing your IT needs if you have between 10 and 80 devices makes more economic sense than having a person in-house who actually has another role in the company or paying a salary to one IT guy to work in-house. Neither of these approaches will get your small business the best service or value for IT support. We also wrote about how having the wrong IT company can cost you time and money & how to prevent this here. However, the difficulty faced by many decision makers and owners in relation to small business IT Support is they can't manage it well themselves, or engaging in a DIY approach. Moreover, they may be with the same IT company for years and not really know what job this IT Guy or IT company is actually doing for them behind the scenes. While there are all shades of IT providers, IT freelancers and IT companies out there, many of them are not equipped to meet the specific needs of your small business IT Support or give the level of custom IT support that your business will need for minimal to no downtime, no data loss and security of your network. Consider the following criteria when your choosing a provider for your small business IT Support: Skills & Experience: Any IT company you choose should have IT Engineers & Consultants who have a minimum of 10 years experience each. Let's face it- choosing rookies may be cheaper but these people are less likely to have encountered & solved the range of IT issues that are out there. They must also have certifications that include ComptiA, Microsoft, VMWare, Ethical Hacker & Cisco. In addition, glowing client references are a must and you should ask for these before signing up with any IT provider. Fiscal Stability- IT is the heart of your business' success & so you need a well established small business IT support provider. if they've been in business for 5 or more years, then this is a good sign. You should also check how many clients they have and their customer retention rate. At Cinnte, we have over 100 clients who are in an ongoing managed business relationship with us- we're an fit ideal for a for small business who has between 10 & 80 employees. Our retention rate is 96% which we pride ourselves on. Testimonials and references are key to verifying companies are as good as they claim to be. We can provide lots of these & you can read them here. Service Level Agreement- You should always check the terms of your service level agreement or contract to ensure that certain standards of service are guaranteed or else there will be penalties to the company. An SLA is a contract that outs forward the standards that your IT company should be able to meet. For example, is there a guaranteed response time or support between fixed times. Choosing the right IT company to give you ongoing small business IT support is critical. If you have any doubts on how good your current IT company is, or you're signing up to a contract with a new IT company or IT guy, you should check their credentials carefully. Always do your research first! If you want to learn more about an IT company can help transform your business & provide stellar small business IT support, contact us today using one of the forms or email us at firstname.lastname@example.org.
- 5 IT Business Solutions to Protect You from Losing Time & Money
If you believe the current IT Business Solutions you have in place to protect your company from losing time and money, you need to re-examine how disaster proof they really are. While it's impossible to plan for every potential IT problem or emergency, a little proactive monitoring and maintenance of your network will help you avoid or greatly reduce the impact of the vast majority of computer disasters you could experience. Step#1: Make Sure You Are Backing Up Your Files Every Day Imagine this: you write the most important piece of information you could ever write on a chalkboard and I come along and erase it. How are you going to get it back? You’re not. Unless you can remember it, or if YOU MADE A COPY OF IT, you can’t recover the data. It’s gone. That is why it is so important to back up your network. There are a number of things that could cause you to lose data files. If the information on the disk is important to you, make sure you have more than one copy of it. Any IT Business Solutions you have in place should always include file back up across multiple sources ideally. If any go missing and cannot be retrieved by your current IT provider, you may want to seriously question what they're doing to safeguard your data. Step #2: Check Your Backups On A Regular Basis To Make Sure They Are Working Properly This is another big mistake we see very often. Many business owners or their IT provider, set up some type of backup system, but then never check to make sure it’s working properly. It’s not uncommon for a system to APPEAR to be backing up when in reality, it’s not. There are dozens of things that can go wrong and cause your backup to become corrupt and useless. That is why it’s not enough to simply back up your system; you or your IT provider must check it on a regular basis to make sure the data is recoverable in the event of an emergency. We have came across a company recently that shelled out €40,000 to recover data they THOUGHT their IT Provider backed up? Don’t let that happen to you. Step #3: Keep An Offsite Copy Of Your Backups What happens if a fire or flood destroys your server AND the backup tapes or drive? This is how many unexpected power cuts have devastated many businesses that have now been forced into bankruptcy or near bankruptcy. What happens if your office gets robbed and they take EVERYTHING? Having an offsite backup is simply a smart way to make sure you can get your business back up and running in a relatively short period of time. Step #4: Make Sure Your Virus Protection Is ALWAYS On AND Up-To-Date You would have to be living under a rock to not know how devastating a virus can be to your network. With virus attacks coming from spam, downloaded data and music files, instant messages, web sites, and e-mails from friends and clients, you cannot afford to be without up-to-date virus protection. Not only can a virus corrupt your files and bring down your network, but it can also hurt your reputation. If you or one of your employees unknowingly spreads a virus to a customer, or if the virus hijacks your e-mail address book, you’re going to make a lot of people very angry. Step #5: Set Up A Firewall Small & medium business owners tend to think that because they are “just a small business”, no one would waste time trying to hack in to their network, when nothing could be further from the truth. We’ve conducted experiments where we connected a single computer to the Internet with no firewall. Within hours, over 13 gigabytes of space was taken over by malicious code and files that could not be deleted. The simple fact is that there are thousands of unscrupulous individuals out there who think it’s fun to disable your computer just because they can. These individuals strike randomly by searching the Internet for open, unprotected ports. As soon as they find one, they will delete files or download huge files that cannot be deleted, shutting down your hard drive. They can also use your computer as a zombie for storing pirated software or sending spam, which will cause your ISP to shut YOU down and prevent you from accessing the Internet or sending and receiving e-mail. If the malicious programs can’t be deleted, you’ll have to re-format the entire hard drive causing you to lose every piece of information you’ve ever owned UNLESS you were backing up your files properly. The takeaway is that if your current IT provider is not providing you IT Business solutions to address and proactively manage all of these critical aspects of a strong IT strategy, you are setting yourself for disaster, or they are. This is not acceptable and we know most business cannot afford to lose time or money. It doesn't pay you or your employees. How Can I check if my current provider is actually protecting my network & delivering top IT Business Solutions: Thanks to a complimentary service we are currently offering; a complete IT Network Assessment, we can completely assess & audit your computer network to check your overall IT health. We can check if you're free you from expensive, frustrating computer problems, downtime, and security threats. You’ll get all the benefits of a highly-trained, full-time IT department at only a fraction of the cost. And here is the best part… In most cases, we can show you how cut your IT Business solutions & support costs by 30% to 50% WHILE improving the reliability and performance of your network and eliminating spyware, spam, downtime, and other computer frustrations! It's a no- brainer that you should at least think about this. If your business has 10 or more devices, sign up today for our free IT Network Assessment today by emailing us to email@example.com. Alternatively you can fill out our quick pre-assessment voucher here and we can kick things off for you. This is a limited and no-commitment offer so don't miss out. We won't be offering to do this free of charge after August 15th!
- IT Solutions- learn these 5 Truths to Transform Your Business With Technology...
Have you ever wondered if IT is worth investing in, or if IT Solutions can transform your business? Wonder no more because we will explain how you can achieve greater business profits, superior employee performance and productivity with the right IT strategy in place. Investing In Tech Is A Must- Investing in your own IT Solutions and infrastructure is critical, but you get what you pay for. Go cheap, and you’ll expect to buy again. Go quality, and you’ll be more pleased with the results. It’s Not Easy finding your ideal IT Solutions- Shifting a business mindset from analog to digital is hard, especially if you’ve been doing things one way for a long time. When you prepare yourself and your team for a challenge, you’ll be able to better meet that challenge. It’s Fast-Paced- Tech moves fast. You see buzzwords everywhere – “5G” or “blockchain” – and it can be confusing. You may feel pressure to keep up, but don’t jump in without a plan. Do research and make changes that truly apply to your business. Cyber Security Is Essential- Stay up to date on security trends and solutions. Remember that cybercriminals target small business, but when you stay ahead of the curve on IT security, you stay ahead of the bad guys. Leadership Is As Important As Ever. Technology is only as good as the people who use it. As you learn about new tech or invest in it for your business, make sure your team is learning too. Understand how your customers use technology and be willing to learn and adapt to them. If you want to learn more about cyber security and how it can help your business, please sign up for our free cyber security assessment today by filling out our short cyber assessment form and one of our team will get back to you within one to two business days. Alternatively, do email us today at firstname.lastname@example.org & learn more about how our free Cyber Security Assessment can help your business grow and be more secure!
- Let IT Services Help Your Business Sustain Your Remote Employees
As we slowly emerge from the COVID-19 crisis, one trend has become very obvious. Remote working and non-traditional office based workforce are going to no longer be the default for many businesses and remote working employees will be the “new normal” for businesses throughout Ireland and globally. This is both an opportunity and a challenge for business in terms of HR, Operations and of course, your IT function. If you’re thinking about maintaining some of the roles in your small to medium-sized business as work-from-home after the country reopens, robust IT services can help you make the transition permanent. Does Remote Working Enabling Really Me Save money if I'm a Business Decision Maker? It’s hard to take stock of your financial standpoint for many businesses at this point in the COVID-19 pandemic. While you may have lost profits due to restrictions put in place during lockdown measures; less footfall & a lack of new business opportunities across many industries, you’ve probably have found that your office expenditures have decreased overall! What if you could keep saving money on your organization’s expenses after your customer base returns? This is where IT services and remote working enabling at a very high level comes into play. Having robust IT security, cloud computing networks and infrastructure is vital. That is in addition to having strong, responsive IT support who will be absolutely crucial to this remote working being successful for your business in the medium-long term. Cinnte IT is the IT Services Provider Remote Workforces Can Trust & Rely Upon Cinnte IT were more than ready when COVID-19 drove employees out of their offices into their home offices. It has been our strategy for remote working setup and enabling for years prior to this and indeed, we were able to rapidly provide our clients with the solutions and IT services they needed to remain up and running without downtime. With our superior upgraded antivirus platforms and cutting-edge cloud technologies, we at Cinnte IT are prepared to help your business sustain a remote workforce. That is either temporarily or permanently, whatever your preference is. We are offering offering a free, no risk, no-commitment technology consultation to help measure your company's current IT setup. Let our in-house Technology Experts help you decide if your business is already in great shape, or if you require better IT services for maintaining your remote employees operating productively and securely with improved connectivity and efficiency. Just email us at email@example.com and we'll set this consultation up for you in no time or click here to schedule a no cost, no commitment phone consultation with our In-House IT Experts!
- Protect Your Business From IT Security Threats
Top Ways to Protect Your Business From IT Security Risks during the COVID-19 Crisis During the current crisis caused by COVID-19, IT Security has never been more important to your business. Today, cyber crime is more than a potential threat facing your business. It’s an unavoidable force of nature and has became ever worse due to the COVID-19 crisis. It’s like preparing for hurricanes, earthquakes or any type of natural or man-made disaster that could create business survival and growth issues. It is the same thing with a digital cyber-event.For many of us, it’s easy to imagine these kinds of things happening to someone else and not us. The problem is that cyber criminals go after everyone ans especially now in a time of crisis. IT security will be an area perhaps overlooked now with so many remote workers in Ireland and globally. Hackers and cyber criminals will find ever more opportunities to breach IT security with home networks being more easy to circumvent and even lack of strong antivirus software, firewall or lack of IT Administrator control over downloads from home laptops, encryption or 2 factor authentication. To name but a few overlooked security measures for remote working. Cyber criminals cast a wide net because that gets results through relaxed or a lack of IT security policies during a crisis like COVID-19. How seriously do I need to take the so called IT security threat during COVID-19? Our team at Cinnte believes you should be taking this very seriously. We work closely with tech companies like Google & Microsoft who advise and research trends and keep up to date with their findings. Indeed senior sources at Microsoft have said in recent times including Roger Grimes, that eventually every business will be hacked & that every company is completely and utterly owned by a nefarious hacker or easily could be. Irish SME owners and senior management in Ireland might imagine that they are immune from cyber attacks or IT security breaches. This is a wrong assumption to have, however. You may be if the view that, ‘we don’t have enough cash to justify some faceless hacker’s effort.’ We would all be be wrong to think this way. The reality is around half of cyber-attacks go after small businesses. These don’t really get reported by the media. They’re not as flashy as a cyber-attack against a big bank or retailer. But it’s the attacks against small businesses that do the most damage. One 2016 study found that 60% of small businesses hit with a cyber-attack closed within six months. What proactive cost effective things can I do as a business decision maker to keep my company’s data secure during the COVID-19 crisis & beyond? Thankfully, it’s not all bad news. While some business owners have no clue what cyber security they have in place, others are looking for ways to shore up their businesses. There are steps you can take to keep the bad guys out. Two of the best ways to do that are to simply keep all your software up-to-date and keep your team educated about the threats. The two most likely reasons you will get exploited are due to unpatched software or a social engineering event where someone is tricked into installing something they shouldn’t that may look legit but is actually ransomeware. How can you keep your software up-to-date? You can actually automate a lot of it. There are several easy-to-use tools built just for this to increase your IT security. Many of them also let you manage your software across your entire network from one set location. Say goodbye to jumping around and coordinating updates. Even better, there are many platforms capable of updating themselves. You just want to keep a close eye on them. Do I need an enhanced company wide policy for IT Security during COVID-19? It’s always a good idea to put strong company policies in place around IT security and common usage. You want to be clear about your security and help inform employees about the dangers posed by malicious files and e-mails, among other things. Take time to educate them on the threats that are out there. And keep the education ongoing, because the threats are ongoing. The bad guys are always looking for new ways to break in. And don’t forget about accountability. Keep the conversation going and talk to your employees about what they know about cyber security. Some businesses go so far as including cyber security training in their onboarding. Education is everything. What else can I do to improve my IT security that is going to be easy to implement & economical? Finally, you MUST partner with a highly trained, security-focused managed service provider or other Managed Services IT provider. They must be dedicated to keeping you protected from these constant threats. Some businesses try to do it on their own only to realize they don’t have the resources. Others think they need an entire in-house IT team to handle all of these threats. But the fact is, by outsourcing the work, you save money while keeping out the bad guys optimizing key parts of your network and software. It’s a win/win. It’s all about being proactive. When you have a group of experts working every day behind the scenes, IT security stays top of mind in your organization, whether you’re thinking about it or not. Really, it’s one less thing you have to stress about. Want to learn more about easy, cost effective IT Security measures and other IT stuff like remote working? Book a free 15 minute Phone Support & Discovery consultation with one of our IT Security Experts today. Just click below and book today to schedule your free call!
- The ONE Thing You Must Do to Keep Your Cloud Data Secure
What your business can do to ensure your sensitive cloud data is never stolen or breached Do you really know if your cloud data is secure in your business? Especially during a time of crisis like the COVID pandemic, while Hackers and cyber criminals are increasingly trying to breach business’ IT systems, we must not panic, but also be prepared! Cloud data storage is becoming a massive industry in this country, and many businesses and other institutions are putting their data into the cloud. Some of this data is pretty harmless. Other stuff — like hospital records, banking information, or company payrolls — are prime targets for bad actors or cyber criminals. Is the cloud storage trade-off worth the risk? In an answer- yes it is. This falls under IT security as well of course and you can learn more about how to ensure your IT security is top notch in our recent blog post. However, as a business owner or manager, you must be proactive in ensuring you and your employees do all possible to ensure that your cloud data is secure. More importantly, your IT provider or in-house IT guy must be but encrypting your sensitive data. Where is my company’s data actually being stored or managed? Every cloud storage company you talk to will claim to take top-of-the-line security measures on behalf of your data. But that, in a nutshell, highlights the problem with cloud storage. Your data is entrusted to a third party for safekeeping. It’s possible that they’d do everything in their power to safeguard your information. But bad things, like ransomware, phishing, or just plain going out of business, do happen. And when they happen, it’s not the cloud storage company whose data is on the line; it’s yours. Even if that doesn’t occur, let’s be honest. Most of the major cloud storage companies are based in the United States, the U.K., Ireland or France, where they could be subject to NSA snooping (or questionably legal surveillance from any other government entity). Despite the best efforts of many storage companies to prevent government intrusion, your data could still be at risk, even when it’s locked up tight. Why is encryption so important in cloud data storage? This brings us back to encryption, which is the hands-down best way to protect your data, period. It’s just like locking sensitive data in a box, with a password needed to reopen it. Even if someone gets ahold of the box, if they don’t have the password, there’s nothing they can do with it. You can encrypt data yourself with free tools. There are a lot of encryption tools out there and you’ll want to make sure that you have the right one for your specific needs. If you ever need a recommendation, don’t hesitate to reach out and ask! We’ll be happy to provide you with the specific recommendation (free or paid) that fits your needs. In addition, most cloud storage companies protect your data with their own encryption, but this isn’t as secure as encrypting your own information. That’s because the cloud storage company has the encrypted data in its possession, but it also has the keys to that data. If someone can get in, they can probably get the information they want. And a disgruntled employee — or just a hapless one — can also provide hackers access to the system through good old-fashioned human engineering. Is it really important for your IT Provider to encrypt your cloud data? If the cloud storage company is compromised (and it happens quite often), will your data be secured or unsecured? Well, if you’re encrypting your own data before uploading it, then the bad actors will open up the safe to find … a bunch of locked boxes. Pretty frustrating, right? On the other hand, if you’ve trusted the cloud storage company to take care of everything, you’re going to have a bad day. As you can tell, it makes sense to have your IT guy encrypt everything that gets put on the cloud before it gets there. But remember, just as your cloud storage provider is vulnerable, you can be vulnerable as well. It’s less likely that bad actors will target your company specifically, but if they want your data bad enough, they’ll go to great lengths to get it. What’s the most likely way Hackers can actually get access to my data and how a good IT Provider should stop this? Many people have a misconception that these criminals will just use a magic program to crack your encrypted files. Decryption does exist, but it requires a lot of time and processing power. It’s far more likely that hackers will target your email or other aspects of your system and try to find out the encryption codes that way. And never forget that people are the weakest part of your IT security. Educate employees so they aren’t vulnerable to phishing scams, downloading questionable software, and visiting the wrong websites. Present a “hard target” when it comes to your cloud storage, and seriously, encrypt your data before you put it online. If your IT guy isn’t doing that already, you need a new one. If you want to talk to us about cloud data storage and security and need any advice on how you should be managing, let us help you out. We are always happy to help businesses out and give free, expert advice where we can to help you plan and keep your systems safe & secure! Schedule your Free support and discovery call today with our in-house IT Security Expert & MD, Danny Barr.
- Stop Covid-19 Cyber criminals during this pandemic
Covid-19 Cyber criminals Are Counting On You Letting Your Guard Down During This Global Pandemic Covid-19 Cyber criminals all over the world and in Ireland will be counting on businesses and others become less guarded regarding their internet usage and their IT security during the current crisis. The world is slowing down during this world pandemic. The global economy is being hit hard. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups. Should I really be worried about IT Security at this time & Covid-19 cyber criminals Stealing My Information You can bet there’s one group that’s not slowing down at all. In fact, they’re probably working overtime while the rest of us have our lives turned upside down. Cyber criminals and hackers know there’s no better time to strike than during a global crisis. While you are distracted and spending your time trying to make sense of this new normal, they are finding new ways into your IT network so they can steal data and passwords, compromise your clients’ private information and even demand large ransoms. Cyber criminals are already increasing their illegal activities and this expected to cause €6 biliion damages by 2021 across Europe! But, if history repeats itself, hackers will be out in full force throughout this corona virus scare. We fully expect in the upcoming weeks that headlines will change from stories about COVID-19 to accounts of a frenzy of cyber-attacks on corporations and small businesses by Covid-19 cyber criminals. Here are solutions you can implement now to help protect your business data, money and productivity 1. Be more suspicious of incoming e-mails. Because people are scared and confused right now, it’s the perfect time for hackers to send e-mails with dangerous malware and viruses. At this moment, your in-box is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails. Always carefully inspect the e-mail and make sure you know the sender. There’s a .gov e-mail address out there now that’s not legitimate and is spamming in-boxes across the country. Avoid clicking links in the e-mail unless it’s clear where they go. And you should never download an attachment unless you know who sent it and what it is. Communicate these safeguards to everyone on your team, especially if they are working from home. 2. Ensure your work-from-home computers are secure. Another reason we expect a rise in cyber-attacks during this pandemic is the dramatic increase in employees working from home. Far too many employers won’t think about security as their team starts working at the kitchen table. That’s a dangerous precedent. First, make sure your employees are not using their home computers or devices when working. Second, ensure your work-at-home computers have a firewall that’s turned on. Finally, your network and data are not truly secure unless your employees utilize a VPN (virtual private network). If you need help in arranging your new work-from-home environment, we would be happy to get your entire team set up. Learn more in our recent blog post about how to work productively from home during this weird time. 3. Improve your password strategy. During crises like the one we are all facing right now, your passwords could mean the difference between spending your time relearning how to grow your business and trying to recoup finances and private data that’s been hacked. Make a point now to reevaluate your passwords and direct your team to create stronger passwords. Also, while it’s so convenient to save your passwords in your web browser, it also lessens your security. Because web browsers simply require their own password or PIN to access saved passwords, a skilled hacker can bypass this hurdle. Once they access your saved passwords, they can steal as much as they want – credit card information, customers’ private data and more! Instead, you should consider a password manager to keep all of your passwords in one place. These password managers feature robust security. A few options are [LastPass, 1Password and Keeper Security Password Manager]. You, your team and your family have enough to concern yourselves with in regards to staying healthy, living a more isolated lifestyle and keeping your business strong. There’s no need to invite in more problems by letting your computer and network security slide during these times. If you need additional security advice or would like to have a free phone discovery consultation to discuss how to keep your data safe, simply connect with us today & book in for a 10 to 15 minute chat!
- Remote Working During COVID-19 Made Easy
How You Can Quickly Shift To A Remote Working Business Model To Maximize Productivity In Today’s Challenging Climate As a business owner at the moment, you’re now facing unprecedented challenges including remote working set up and management, to help deal with the corona virus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19. These are all reasonable requests. However, as a business owner you also need to maximize productivity, bring in revenue and try to grow your business in these demanding times. How can you accomplish these goals when your office is now likely closed, and you’re concerned about productivity dropping off? That’s where we as an IT Managed Service Provider want to guide you as best we can to get the best out of your employees and your IT resources at this challenging time to drive productivity and get positive outcomes from remote working while staying secure, disaster free and driving growth. How do I enable remote working from home while managing employees and ensuring operational success? The answer does lie in setting up your office to function remotely, but if you haven’t done so or are just starting to get this process rolling we can guide you along to ensure success. We recently wrote about IT hacking here and this is something t be mindful of especially with remote working however, there is no need to panic because there are steps to stay secure. If you’ve never implemented a work-from-home policy before, it may seem like a whole different world. Managing an entirely remote workforce goes far beyond giving your employees a laptop and reminding them to check in every once in a while. After all, there are many factors most business owners haven’t ever had to consider, such as: What technologies do I need? How can my employees work from home without compromising the security of our network? How can I make this new work environment as easy, comfortable and productive as possible? 1. Don’t allow employees to use home computers or devices- Their mindset may be, “Well, I’m working from home so I may as well use my home computer.” This is a dangerous mistake. Our team works hard to ensure your company computers and network are secure and protected from malware, viruses and cyber-attacks. Their home computers and devices could be littered with tons of downloaded music, videos, images and more. Because it’s more exposed, it can invite malware into your network. Rather, provide a company-approved and secured computer/laptop for employees to use at home. 2. Secure their WiFi access point. Without a secure WiFi access point, you’re essentially leaving a back door open to hackers. That’s because WiFi signals are often broadcast far beyond your employees’ homes and out into streets. Unfortunately drive-by hacking is becoming more popular among cyber-criminals today. A few tips for securing your employees’ WiFi access points: Use stronger encryption and a more complex password Hide your network name Use a firewall These security measures are not difficult to set up. But if you have any questions or need assistance, we will be happy to help get your employees set up remotely. 3. Use a two-factor authentication VPN. VPN stands for virtual private network. It’s essentially a private, encrypted tunnel that goes direct to your IT network in your office. Ideally, you’ll want your VPN to support two-factor authentication. This means it’s doubly secure because your employees will need to call in to access the network. If you don’t have a VPN for your employees to use, you can consider other services, such as GoToMyPC or Zoho. While these products are not as secure, at least they keep your home network from being exposed. As business owners & directors ourselves, we too are having to pivot and work differently than we ever have before. However, because we have the technology and infrastructure in place, we are still surprisingly productive. Can I get this done with minimal disruption & little or no financial cost? Yes, you can is the answer to both questions. Our team wants to help your business survive and thrive during today’s unique environment. If you and your IT team need extra hands right now…or solutions to help your employees work SECURELY from home…we have software tools, expert staff and resources we’d like to offer you to keep your business as productive as possible. You can email firstname.lastname@example.org & let us know what day/time suits you for this quick call to suss where you are regarding your IT in your business so we can plan this together! Stay safe and stay positive!