First, let?s consider what kind of data you might have that a cybercriminal would be interested in stealing. What Does My Business Have That’s Worth Protecting? Regardless of your organization?s size or industry, you almost certainly?actually, scratch that, you definitely?have data that is of value to cybercriminals. You accept payments, don?t you? Chances are, some if not most of these payments are in the form of credit. This data alone is worth quite a bit. Then you also have to consider your own company?s financial accounts and details, the other data you?ve collected regarding your clients, or any of your company?s trade secrets. There?s also the possibility that your business isn?t the final target at all, and that you?re simply being used as a convenient means of accessing their true target. So there?s plenty that any business has to offer that a cybercriminal would be interested in, at the expense of the business? finances (both in terms of rectifying the attack and losing business opportunities) and of its reputation. The Right Cybersecurity Solutions Can Help Ensure Your Business? Data Remains Safe There are a variety of things that you can (read: should) do to protect your business, from training your employees to be more security-conscious throughout the workday to maintaining a comprehensive backup and disaster recovery strategy. Even more fundamentally, however, you need to ensure that your business? network is protected through dedicated and properly-configured cybersecurity tools. These tools involve: Network Firewalls The most desirable threat to your business (stay with me here) is one that you don?t have to deal with at all. A properly-configured firewall will help keep these threats at bay by blocking them before they enter your network. Antivirus Again, the best threats are the ones that are neutralized before you ever have to worry about them. An antivirus program with updated threat definitions can help keep your network free of the vast majority of issues. Multi-Factor Authentication This is a security feature that augments the traditional password authentication measures we?re all so familiar with. The hard truth of the matter is that passwords aren?t all that great of a security measure, as they?re either too easy to guess or too difficult to remember. While we recommend that you still use unique passwords for all of your accounts, MFA takes the security they offer and increases it exponentially by requiring an additional proof of identity?oftentimes, a generated code or a biometric identifier. Physical Security While it might seem odd to bundle the locks on your doors and a security camera system with your cybersecurity, the digitized nature of these solutions and the capabilities they allow, make them an invaluable part of your cybersecurity stance. Data theft can include someone copying your data onto their own hardware, or even walking off with some of your data storage devices, so keeping those who would do so out of your business is critical as well. We Can Help You Accomplish All This and More At White Mountain IT Services, we take our clients? cybersecurity very seriously, as our success is tied directly to theirs. Find out more about how we could help protect your business by calling (603) 889-0800.
Keep in mind that these ?office? tools, as they will be referred to from here on out, will largely consist of the same types of applications, just with different names. We?ll use Microsoft Office as an example, but you can apply similar logic and functionality to Google Apps and other productivity suites. Microsoft Word With a word processor like Microsoft Word, you can create all of the documents your business might need to succeed. You might need to write up contracts, letters of hire, physical mailings, and other important documents, all to keep your operations running. A word processor makes this process much easier and more dynamic, unlike the simple tools provided by Windows, such as Notepad or Wordpad. Microsoft Excel The ability to build spreadsheets and charts is extremely important to provide a visual tool for examining data, but they are helpful for much more than that. They can be used to build budgets, analyze statistics, and so much more. If you have good spreadsheet software, you?ll find that comparing or viewing data is easier than ever. Microsoft PowerPoint A successful business often must put together presentations, be they for their potential clients or for their employees. With slideshow software like Microsoft PowerPoint, you can create more dynamic slideshows to keep your audience engaged. Microsoft Outlook An email solution is absolutely crucial to the success of your business, and most productivity suites will come with an email solution to leverage to your advantage. An email system gives your business a professional outlet for people to ask questions or inquire about your goods and services. Other Office Tools Productivity suites also hold a lot of other tools for your business to use, like note-taking applications, publication editing, meeting and communication software, and so on. If you know which tools you want and need to use, you can look for a productivity suite that provides all of those tools; anything else is extra and might be fun to experiment with, provided you aren?t paying extra for it. Get Started Today We know that it?s not always easy to choose a productivity suite, so we want to help you make the process easier by working with White Mountain IT Services. We can help you determine the best path forward for your business. To learn more, reach out to us at (603) 889-0800.
Is Malware Spending Your Money? This type of malware is especially tricky. Where ransomware is immediately in your face, demanding money in order to give you access back to your computer and data, toll fraud malware just spends your money without your consent. It works by subscribing you to paid content and adding the charge to your phone bill. It might temporarily disconnect your device from Wi-Fi in order to force your phone to use the cellular network. It will also try to hide any one-time passwords, two-factor messages, and verification messages in order to keep its work hidden from you. This isn?t an entirely new concept?toll fraud was a problem years ago that would affect users with dial-up internet connections, and it has made a few appearances over the years with the popularity of mobile phones. Microsoft, however, has issued a warning that toll fraud malware is becoming a very big problem for a lot of users. How to Prevent Getting Malware on My Device To protect yourself, you need to be aware of what you install on your device. You can?t trust everything. While Google and Apple both do a pretty good job at vetting applications, the system isn?t perfect. An app on a trusted app store isn?t always going to be safe to use. Often malware is found on apps in popular categories found in the app store, like wallpaper and lock screen apps, or apps claiming to speed up your device or protect it from viruses. When you install an app on your phone, it will ask for permissions that don?t make sense (there?s no reason that your new wallpaper app needs to have access to SMS or notification listening privileges). You do, however, want to avoid installing apps that aren?t on the Google Play Store. There?s an even higher chance that an app that isn?t on the Play Store might be dangerous. It?s all about being careful. Don?t install things that you don?t really need, and if you are having an issue with a device, have someone take a look at it. An application usually isn?t going to improve the performance of a device, but if you feel like you need to speed up an older device, a professional can help you determine the best way to do that, if it?s possible. You can also look at reviews for the app, and take your time reading the app description and information about the developer. If something seems suspicious, it?s worth scrutinizing. If you are having an issue with any technology, don?t hesitate to give us a call at (603) 889-0800.
Why is Risk Management Crucial to Your Cybersecurity? In a word, preparedness? but a strategic approach to it. Let me ask you this: if your business was located in the middle of the Sahara Desert, would you be terribly concerned about a snowstorm interrupting your processes? Of course not, so you certainly wouldn?t prioritize any efforts that were specifically intended to fight a snowstorm?you wouldn?t keep a supply of snow shovels to clear off the roof, for instance. Risk management is the practical approach behind this extreme example, and when applied to your cybersecurity, it is based on the unique balance of cybersecurity risks that your business exhibits. By developing a cybersecurity risk management plan, you are able to adjust your approach to match this balance. How to Fulfill Cybersecurity Risk Management Generally speaking, the process behind cybersecurity risk management is as follows: Identify Potential Threats First, consider your business? hardware infrastructure and the software that it hosts. Are there any known vulnerabilities that might affect it? What threats could potentially bypass your existing protections? Having a comprehensive list of these potential threats from the start will be crucial. Weigh Out Each Threat?s Potential Risk Once you?ve created your list of potential threats, you need to determine how likely each threat is to occur?and whether or not you can live with that likelihood. As you do so, you should keep the impact that each threat might have in mind. After conducting this impact analysis, you should have a tiered list of potential threats arranged by their risk. Establish a Response to Each Risk Level Using this list, you are ready to determine how each risk level should be approached. Generally speaking, there are four responses that you can take that are known as the four Ts of risk management: Tolerate – If you determine the risk is unlikely enough or not severe enough to address, you accept that you may encounter it. Treat – If the risk is sufficiently concerning, you put security measures in place to reduce its likelihood. Transfer – If there?s a risk that is beyond your capabilities to control, you involve other parties in the risk?outsourcing your protections, and/or taking out cybersecurity insurance. Terminate – If the risk is severe enough, you fully avoid it by altering the processes that create the risk, if not suspending them entirely. Continue to Monitor These Risks and Adjust as Appropriate After addressing your risks, based on the above responses, you should continue to keep an eye on them. Reexamine your potential threats every so often to see if your level of risk has changed and if you need to reconsider if your established response is still appropriate. With the threat landscape changing constantly, it?s almost guaranteed that your responses will have to change at some point. We Can Assist You with Your Cybersecurity Risk Management Remember the transfer option we reviewed above? White Mountain IT Services is one such party you can outsource some of your protections to. Our comprehensive cybersecurity measures can help to treat and terminate many of your largest business risks. Give us a call at (603) 889-0800 to start mitigating those things that threaten your business.
Build an Emergency Contact Sheet as a Part of Your Business Continuity Plan Yep, it sounds simple. In fact, it?s probably something that you already have, but let?s make sure that it?s up-to-date and includes some good information that will help you and your staff in case there is a major disruption to your business. What do we mean by a disruption? Let?s assume you can?t access any of your systems; your line of business apps, your email, your contacts, and the documents on your server. Let?s assume that something big locks you and your staff out of everything for a day or two. It?s not ideal, and obviously we want businesses to work with us to be more prepared for this, and have safeguards in place to prevent this type of threat. Even so, having a really good contact list is going to be key for communication. Open up a Word document and list out the name and personal phone number of each employee, starting with management. Note if that number is a cell phone (so you know which numbers can be texted). Next, list out emergency contact information?the local fire department, police, 911, etc. List out insurance contact information. If you have an alarm company, add them to the list, and other vendors you might need to reach. We recommend adding (603) 889-0800 so you can call us if you need help. Finally, depending on your business, you may want to add some of your biggest, most important clients to that list. You?ll want to contact them first thing and let them know that there may be a disruption of services. If one morning you get alerted that your entire network is down and nobody can access anything, you?ll be so glad you had this. That?s a Good Start, But Business Continuity Doesn?t End There Having a thorough, tested business continuity plan is an important tool for any organization. Communication is key, and you?ll want to be able to keep your staff and customers in the loop if something disrupts your services. At White Mountain IT Services, we help businesses prepare for emergencies with our iron-clad data backup and disaster recovery services, and we can help protect your business from online threats and other problems that could cause major disruptions. For more information, give us a call today at (603) 889-0800.