Your business is too important to simply invite hackers in to torment you and encrypt your data or otherwise paralyze your operations. It happens every day in the small business arena, and the nightmare that one client experienced need not happen to you. Keep in mind, hackers have automated tools to exploit your vulnerabilities for fun and profit. You need to shift from knowing this is an issue to taking action to protect your assets.
It is time to fully realize that your business is under attack by malicious hackers. You need to lower your attack vector so hackers are unable to exploit your company. Here’s what happened recently to a client that should have acted before the problem arose: A manufacturing company choose to stay vulnerable by ignoring smart IT advice. They kept their Windows 2003 Server running, they still had Windows XP machines connected to the network, and they had some scattered USB drives on desktop devices for a “local backup”. This “open invitation” led a hacker to install a crypto virus on a server, as well as gain access to all of the other easy-to-identify servers in the network, without a password. The company’s data were encrypted and held for ransom. Even the backup data on the USB drives were encrypted, making an up-to-date recovery impossible. Fortunately, and after 80 hours of IT consulting work to restore data, the company was able to use a 7-month old backup file to at least partially recover and become functional. All avoidable, of course, with a sound data protection and technology deployment plan. Migrating away from XP, once and for all, and upgrading to current server software along with smart data backup is a good start. You might be unknowlingly leaving the door wide open for hackers to come in and ruin your business. Whether you are highly vulnerable, or as protected as can be is a choice. This choice is clear as you take a close look at your exposure. Hackers have enough tools to succeed without you making it too easy for them. When they find a company that is “just begging” to be hacked, they get a certain thrill in punishing the unsuspecting or ignorant victims, and those who are in full denial about cyberthreats. My message: Make it difficult for hackers by taking steps to lower your vulnerability. Smart IT security decisions can help you reduce exposure and minimize your attack vector.
Your Decision: Choose the maximum protection you can afford for the risk level you can accept. We’ll assess and advise you, and help you implement the best solution. Since way back in 1986, when CTS Services, Inc. started, our goal has been to keep your business up and running. Now, we’ve added to that value statement; We help you protect your company’s IT assets. Better. Call to discuss your fears and concerns, and to address your questions about risking your business to hackers. Sincerely, Michelle Carlow President, CTS Services, Inc. PS: References: I invite you to explore the below links, or simply google the phrase “IT attack vector” and discover what might be a new vocabulary in your IT or business world. Then, if you are feeling vulnerable and at risk, call to discuss a strategy for protecting your company better. Our resident IT security expert staff can help you implement a smart strategy. https://insights.sei.cmu.edu/cert/2013/10/vulnerabilities-and-attack-vectors.html http://searchsecurity.techtarget.com/definition/attack-vector https://eforensicsmag.com/attack-vector/ You've got a business to run, and locking down your network, to the degree that you can, is essential. You know that, and since our job is to help keep your business up and running we continue to shine a light on cybersecurity. Making matters more challenging is the shortage of cyber security talent in this relatively new IT field. No wonder small businesses are vulnerable!
The trap that small businesses fall into is the false belief that hackers and cyber-creeps are only interested in large businesses and governmental agencies. The truth is that your business is likely more vulnerable than you think, and constant vigilance is required. Here are a few things you should know:
We're here to help you minimize your risk. Our Managed Services Program offers a complete suite of services which can also be unbundled to address specific issues. It all starts with a consultation or our free 28-point network evaluation. Here to help you keep your IT systems secure. Sincerely, Michelle Carlow President CTS Services, Inc. Four IT Goals We Recommend For All Small/Medium Businesses: Start 2017 With A Strong IT Plan2/1/2017
It's time to take steps to ensure a smooth and prosperous new IT year!
Now that we are well into the new year and things begin to return to normal, I want to recommend four IT goals that you may choose to adopt. This is a good time to review all of your IT policies, technologies, and procedures to ensure your business operates securely and optimally. We partner with the best of the best technology providers so we can help you achieve your goals in each of these areas: 1. Storage capacity and system performance: What are the key performance indicators for your business? Your IT systems performance is a contributing factor in the company's ability to meet certain metrics. System storage impacts performance. Keep in mind that data storage requirements grow each year as new information and expanding backup requirements grow. We can help you plan and manage your data storage systems to meet the demands of your business. We can help you measure and monitor your storage performance. 2. Data protection and disaster recovery: Let's talk... before a disaster strikes, please. Of all of the risks you take in business, gambling on the integrity of your data protection and data recovery plan is a risk we recommend you avoid. Too many of the businesses we serve fail to fully implement, test and enforce a strong data backup plan. Policies are usually inadequate. Backup technology and procedures are out of date and often untested, and should a real disaster occur they are hardly prepared. Power surge protection goes hand in hand with data protection! Your company's Backup and Recovery Policy is intended to ensure that computers are regularly backed up to prevent loss of data. This Backup and Recovery Policy is designed to protect data in the organization to be sure it is not lost and can be recovered in the event of an equipment failure, intentional destruction of data, or disaster. 3. Network security and access control: Are your private WiFi access points really private and secure? Do you have a separate public WiFi for visitors and guests? Do you have stringent policies in place for the ever-growing number of mobile devices? Have you installed mobile device management (MDM) software on each device? MDM is the administrative area dealing with deploying, securing, monitoring, integrating and managing mobile devices, such as smartphones, tablets, and laptops in the workplace. 4. Cyber-security: We really do not need to tell you that cyber-security is important. You know it already. It's the never ending story in business, and in our personal lives as well. Cyber-security, also known as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. All small and medium businesses are as vulnerable as larger enterprises. Aside from vigilance and constant security monitoring (and a solid back-up plan), we recommend taking these two steps to increase your knowledge and comfort level:
At the very least, test your back up and restore functionality and policies. To a great 2017! Michelle Carlow President, CTS Services, Inc. |
AuthorOur blog posts are written by several members of our team. Please contact us if a particular post or topic is of further interest. We're here to help keep your business up and running. Archives
December 2023
Categories |