10 basic (but essential) business tech security tips

Being aware of basic IT security isn’t just the first step towards a safer network for your business, it is essential knowledge. Hacking is both lucrative and more common than we know.

For any professional serious about protecting their tech, we’ve put together 10 basic, but essential, security tips:

1. Leverage Cloud technologies

The cloud is an incredibly useful tool for small and medium sized enterprises as it allows easy-access to a secure data centre. By utilising cloud-based computing, you can rest easy in the knowledge that the protection of your important data has been outsourced to a larger company with heightened security capabilities. For this reason, be sure you know all the facts before signing up to any service, especially where their data centres are stored.

2. Use a good Firewall

Firewall’s may seem like a bit of a no-brainer, but really they are the epitome of frontline protection against network intrusions. Rather than opting for free software, it is very much recommended that medium-sized businesses invest what they can into a good Firewall to ensure the best protection.

3. Keep it clean and tidy

Clean and tidy is the way! In order to ensure that your computer isn’t at risk of security breaches through old software exploits, keep all of your primary software updated and remove any unused applications. This has the added bonus of keeping your systems running at optimum speed for longer.

4. Have your webmaster enable HTTPs on your website

This sounds over-complicated but with a little Google search you’ll soon see that it’s really not. The benefit is that HTTPs websites have an SSL/TLS Certificate installed onto their servers. This encrypts all data transmitted from browser to server. They also have the added bonus of tying your brand identity to your web presence, which encourages visitors to engage with your site safe in the knowledge that it isn’t a phishing attempt.

5. Keep passwords strong and secure

Passwords are very valuable to hackers. To ensure they don’t get yours, create longer passwords with more variety of numbers and special characters, and never use the same one twice.

6. Create level-specific user accounts for your network

Whenever you create a new user account for your business network, bare in mind what that person will need access to and limit their privileges. Admin privileges should be reserved only for IT administrators and the like. Alongside this, create a limited account for guest access for those who don’t work with you.

7. Understand what data is most important – and lucrative

Perhaps one of the best ways to ensure tech security for your business is to get better and understanding what data of your is the most lucrative. Once you understand this, you can work on ensuring that it is well protected.

8. Create social media guidelines for employees

Social media sites can be something of a cornucopia of information. Using social media advocacy can be a great way to increase your brand’s marketing reach. Ensure you create social media guidelines for your employees to ensure that they know what they can – and can’t – share.

9. Hide your business Wi-Fi network

Hiding your Wi-Fi network is a simple way of reducing hacking attempts. This can be done by editing the SSID display options on your router settings.

10. Train your team on identifying phishing

Finally, nothing beats training to ensure the best practice by your team. Alongside password and basic cybersecurity training, ensure that they are able to identify and know how to report email and web phishing attempts.

Things to consider before choosing a cloud platform

Cloud based working has become the norm for many business over the past few years for a number of reasons. The implications for simplicity, enhanced productivity and accessibility are a given. But with such a range of providers and services, deciding on where to invest is no mean feat.

Opting to move your business operations to the cloud can do wonders for an organisation. It can help significantly reduce costs, remove the need for in-house IT experts and substantial hardware, and improve security. It can also dramatically enhance workflow due to better accessibility and collaboration between teams..

There is also the added benefit that it actually compliments remote working. In an era when geographical flexibility is become more and more feasible (and attractive), technology that facilitates it is a must. Cloud-based technology empowers remote workers. Cloud platforms allow for remote accessibility of key information and helps enable collaboration.

Why use a Cloud platform?

What makes cloud platforms so attractive for medium sized businesses is that they work to enable growth within an organisation by eliminating the need to focus on time consuming and potentially stressful concerns such as security, maintenance and backup. Cloud computing means that professionals can rest easy and concentrate on what matters, knowing that  IT support is ready and on hand when it is needed.

If you’re in the market for a cloud platform, there are a few things you should consider before investing:

Which cloud services are you likely to require in the long term?

Understanding which types of cloud services that they provide will obviously be important. But you shouldn’t just look at these services from the point of view of what you need right now. Consider what services you are likely to need further down the line when growth permits. You may be able to find a provider who offers these services as add-ons. For example, basic data storage is great but is there a chance you may require cloud computing services such as virtual networking infrastructure in the future?

How easy is setup for your needs and what level of customer service can be expected?

An easy setup process should be desirable for any cloud service. The ability to easily configure your account for your organisation is essential. Customer support should be first rate as you will be trusting a substantial amount of your data with the platform. Be sure to understand and acknowledge the level of technical support alongside the average response time for customer service.

Do they have a poor history of downtime?

Cloud outages are not only disruptive but they can also be very expensive. Cloud providers that repeatedly experience periods of inaccessibility should be avoided, so be sure you know the downtime history of each cloud provider you consider.

How is security monitored and measured?

Clearly security should be top priority for you, as it should also be for the cloud provider. Be sure you know where the data centre is and how safe and protected it is. Take time to read and understand the supplier’s security standards for customer access and privacy.

How do the company address potential data losses?

This is a worst case scenario, but you need to know how the issue of data losses will be rectified. What systems/agreements do they have in place that mitigate the risks of data loss and how would they compensate for data losses? Ensure you ask questions about what provisions are in place to mitigate against potential data loss as this has major implications for the ability of your business to continue trading should such a loss be incurred.

Just how secure is the cloud? (Spoiler: Very.)

One of the most important considerations for all businesses is security of information and networks. With the revolution in cloud technologies and services, there has been much discussion about security in comparison to traditional IT networks and server technology.

Cloud based technologies have had their share of press particularly in relation to security aspects. What is important is to weigh up the facts and fiction relating to security. Maybe some concerns in the past have been justified. But as cloud technology has developed many of these issues have been rectified.

It would now seem that data and apps held in the cloud could actually be more secure than traditional local server and network technology. Security and privacy issues have always been a major concern for many organisations. They’re also the greatest worries blocking cloud technology adoption. Many organisations feel that if they do not control their data and tech themselves it leaves their systems open to security breaches.

Read on to see if these fears are still well founded and find out why the cloud is actually more secure now than ever!

Data storage and security

Security wise, the physical location of where data is stored is much less important than how it is accessed. The same principle applies to cloud based and traditional storage systems. Whilst web application attacks are targeted at both Cloud and on-site environments, the on-site systems have been shown to suffer far more incidents and attacks than the cloud. So the argument that these systems leads to security breaches because you don’t own them is simply a myth.

Cloud based platforms actually perform better in avoiding attacks.  They are constructed to be more robust and secure to ensue they work effectively and securely for their clients.  Traditional systems don’t have that same focus. They are likely to be administered by network technicians who have less knowledge, expertise and up to date resources. On-site systems are simply not as secure and are therefore more vulnerable to more frequent and more catastrophic attacks.

Attackers exploit weaknesses

It has been well reported that attackers know and will exploit the systems with the weakest security. On site environments serving one organisation are less likely to upgrade their firewall security or invest in the latest technology. However, cloud providers must do so for all their clients as they serve a wider number of businesses and operate vastly larger systems.

How can you ensure cloud security for your business?

You should really focus less on the geographical location of data and systems and more on how easy it is to access them. You need to know what data and systems could be vulnerable and the level of security required to safeguard them.

Cloud based computing is often more secure than traditional systems. You should still ensure you understand how a system works in relation to location and data access prior to investing. However, cloud based systems do provide additional security layers against attacks and vulnerabilities than traditional local based technology.