Monthly Archives: December 2017

Gear up Your Technology in the New Year: Is Your Tech in Check?

This time of year we make our lists and check them twice. Is your technology in check for the new year? Here are some checklists to keep and plans to make to get the most from your technology in the new year.

Verify Your Backup

Data Backup isn’t enough if you don’t periodically verify your backup to ensure it is available for recovery. If this isn’t part of your routine systems maintenance, add this to your New Year’s resolutions to ensure you can rapidly restore your business systems if you suffer a data loss or breach of privacy data.

Certify Your Compliance

Many industry regulations including The Payment Card Industry Data Security Standard (PCI DSS) require periodic PCI certification to demonstrate compliance. Updating your policies and procedures related to network security and other best practices is part of demonstrating PCI compliance. If you are considering online commerce in the new year, also plan to including periodic network monitoring to maintain PCI compliance throughout the year.

Create a Security Checklist

Threat of Cyber attack is expected to continue for the foreseeable future. Consider creating a Cyber Security Checklist in the new year. The American Institute of Certified Public Accounts (AICP) has a 20-point Cyber Security Checklist that is worth a read. Also be sure to review your password.

Upgrade Your Network

Your network is the backbone of your company’s technology platform. Today’s applications put more demand on your network than ever. Increased traffic from communications and collaborations applications, VoIP, and digital media puts additional strain. Multi-location organizations, and those with remote employees, also need reliable network infrastructure.  Assess your network and telecom expense to see where you may have contracts coming up for renewal. Chances are you can get better performance and save in the new year.  

Plan your Cloud Migrations

Cloud adoption and growth will continue to outpace adoption of other technology, including data center, hardware, and legacy software deployments. In the new year, evaluate your Cloud investments with a solid business case. Make sure you understand your compliance requirements and pick your Cloud Strategy for Public, private and hybrid cloud deployments. There is a good fit for most budgets and for most companies large and small.

Gear up to make the most of your technology in the new year. Contact your technology advisor to ensure your tech is in check!  

Cyber Crime

Closing the Door on Cyber Crime

Businesses today are under constant attack from Cyber Criminals. Ransomware,  including the WannaCry Virus , is an example of a top threat to avoid. With the risk of lost data, lost productivity and lost reputation, isn’t it time to close the door on Cyber Crime? Here are a few tips to defend your company from potential cyber attacks.

Document Operating System Security Patch Policies and Procedures

Take the time to review and update your documented security policies and procedures.  Security and related patch policy should identify who is responsible for application and operation of system patches and system updates. Clearly determine whose responsibility it is to apply the latest operating system and related security patches. Whether this process is manual, or done automatically through a managed service, be sure your employees know which is the case. Also, document your policies to verify all your systems are in compliance.

Review your Cybersecurity Framework

Avoid data breaches resulting from lack of Cybersecurity defence. Ensure your AntiVirus and Malware detection definitions are up to date. Utilize spam filtering and other Cyber Threat detection to protect your business. Consider penetration testing to identify any weaknesses on your network. Also ensure your employees are periodically trained to identify and avoid malware and phishing schemes. If you have suffered a data loss due to Cyber attack, ensure you have a communications plan to notify all stakeholders and authorities within adequate time frames. Having a solid data protection plan including Cloud Backup can minimize your exposure and increase your recovery time.

Study Machine Learning to Combat Cyber Threat

Cybercriminals are using automation, artificial intelligence and machine learning to trick you and your employees to take the bait on phishing, ransomware and other cyber attacks. Why not fight fire with fire? Leading Cybersecurity suppliers  are pouring millions of dollars into research and development to embed Machine Learning to detect and combat Cyber threats. This Machine-to- Machine combat will evolve over time and soon combine with artificial intelligence (AI) to train your employees on how to identify and avoid these cyber attacks in the event your perimeter security is breached.

Cyber threat and related Cyber attacks are a top concern for many business owners. Staying one step ahead to protect your business network is a constant effort. Contact your technology advisor to find out more how you can close the door on cyber crime today.