Blog

24th February 2016 News

Keeping secure practical steps for any business

As technology evolves, so too do businesses.  The most successful businesses are those that remain secure and can adapt to the market, its industry and the technology around it.

FOR COMPANIES THAT RELY ON TECHNOLOGY there are two key areas often overlooked yet must be considered to secure your business from the wide range of threats it is exposed to daily.  Firstly, how to manage off-site use of IT, i.e. ‘remote working’, and secondly, steps to take when purchasing or implementing any new IT equipment.

Remote working security

Employees who travel and work outside of the office will need to take extra precautions when using their laptops, phones or tablets in public environments such as hotels, airports, trains and coffee shops.

When employees are outside of the office, they’re at a much greater risk.

Clear practical steps to take such as: –

  • not leaving devices unattended
  • taking care not to display confidential information when in a public area
  • avoiding accessing sensitive information over a public network such as a shared Wi-Fi

WINDOWS 10 TOP TIP

Passport, a Windows 10 security feature, is designed to let Users authenticate themselves to applications, websites and networks without using traditional passwords.  After Windows 10 verifies that you have possession of your device, it will automatically authenticate to websites and applications on your behalf

Using mobile devices

The mobile market has grown dramatically over recent years.  Almost every employee in any company has a data-enabled mobile device, such as a smartphone or tablet.   Companies can either provide employees with devices to help them work remotely or allow them to use their own.

Users with mobile devices need to be aware of the dangers of connecting to the internet outside of their company’s URL filtering software.  Cyber-attacks are more common than ever, because techniques such as Wi-Fi listening and malware installation on fraudulent websites.

WINDOWS 10 TOP TIP

Device Guard, is another feature for Windows 10.  This focuses on blocking every day attacks by vouching for applications that attempt to access a Windows 10 machine or network.  If an application that is not registered on Device Guard attempts access ,Windows 10 will block the connection to keep your device and information secure.

New equipment security

Considerations need to keep in mind whenever your Company upgrades or purchases new IT equipment: –

  1. Set a budget: Set an annual budget to fund IT upgrades, for both employees and the business itself.  Most technology nowadays last a long time, but in many cases technology grows faster than its lifespan.  So, it is important to keep your IT systems up-to-date and equipped to cope with the latest security threats.
  2. Align equipment purchases with security requirements: Define the specific needs of the business and how technology can help you achieve them and, the changing requirements you may have with regards to security.  Ensure that any new purchases deliver against your specified requirements.
  3. Purchase equipment via your IT provider: Avoid buying the ‘latest tech’ just because it’s new and stylish.  Ask your IT provider because they can help you to decide what is best for your company and advise on the technical specification needed.  They have the knowledge and experience to know what is most suitable to meet your needs.

WINDOWS 10 TOP TIP

Windows Hello, a feature of windows 10 to boost security, is just one of many features to consider when upgrading IT systems.  Hello, is designed to remove the need of passwords through using biometrics.  The computer’s ability to identify your face, fingerprint or iris.  Windows Hello is just one of Microsoft’s many attempts at raising the bar of computer and IT equipment security.

Mobile devices, remote technology and other technological advances make businesses more flexible than ever.  However, no business should walk blindly towards new technology without taking the necessary precautions to secure themselves.

 

Let us advise you on secure remote working and equipment procurement.



Back to blog list

Tags