Have You Considered These Risks to Your Business?

The dangers of cyber risks and threats to a business aren’t at the top of the agenda for many small and medium sized companies, but they should be. In recent years, the increase in high-profile data breaches has increased dramatically, and affected millions of people globally.

And because of the increasing commonality of these threats, society is becoming somewhat desensitised to the alarming numbers of risks that affect thousands of large-scale corporations that hold masses of personal information.

It’s often reported that big businesses are hit all the time. For example, Facebook, Tesco Bank, Talk Talk, Travelex and Three Mobile are recent prime examples. It can be forgiven to think that start-ups and small businesses are less of a target, but the reality is that no business, big or small, is 100% safe in the current climate. In fact, International Data Corporation (IDC) recently revealed that approximately 71% of data breaches are now targeted at small businesses.

What is a Risk and what is a Threat?

Before you strategically plan how to prevent your business from being affected by cyber-attacks, it’s essential to understand the difference between a risk and a threat.

Risks are business issues with technical aspects that impact, and is impacted by, all areas of the organisation. The risk element is the potential for uncontrolled loss of something of value, so in the case of data, this would include sensitive information or programs, for example.

A threat can be both unintentional and intentional, targeted or non-targeted attack. A threat can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, scammers and even disgruntled employees and contractors working within an organisation.

In a nutshell, a risk means the potential for loss, damage or destruction of an asset due to a threat exploiting a vulnerability. While on the other hand, a threat is what we’re trying to protect against. This can be in the form of vulnerability, weaknesses or gaps in a security program that can be exploited by threats to gain unauthorised access to an asset.

In most cases, small and medium sized businesses will deploy several technical defences such as Firewalls and Anti-virus software to protect their organisation from such threats. While these technical defences help protect the business, additional steps do need to be taken.

These additional steps are often forgotten about or not considered as they aren’t seen as technologically positioned, but they are a critical starting point for reducing the overall risk to the organisation. These additional steps include:

Leadership

In all organisations, information security needs to be driven from the top down. Most information security initiatives will fail without the support and sponsorship from the Board. The information security strategy needs to align with the business strategy and objectives to ensure the business is doing all it can to prevent serious attacks.

Behaviours and Culture

Information security isn’t just about technology, people also play a critical role. Everyone in the organisations plays an active role in information security and should be tooled with the knowledge on what to do and what not to when faced with a cyber risk or threat.

Asset Management

The organisation should maintain an up to date asset register of hardware and software in use within the business. Each asset should be assigned an owner and a level of criticality. As the saying goes, “you can’t protect what you don’t know you have”.

How can I mitigate these Risks and Threats?

Leadership

Leaders of any organisation, big or small, must have support from the Board or whoever is the ultimate decision-maker and change-enforcer of the business. First and foremost, it can be beneficial to become Cyber Essentials accredited. Cyber Essentials helps guard you against the most common cyber threats and demonstrate your commitment to cybersecurity.

A business must align the information security strategy with the business strategy and objectives, ensuring that this is communicated with all employees. To get started and equip you with the tools, the National Cyber Security Centre (NCSC) offers a comprehensive toolkit designed to encourage essential cybersecurity discussions between the Board and their technical experts. They also provide a free service called ‘Exercise in a Box’ which can help determine how resilient a business is to a cyber-attack.

Behaviours and Culture

The practical implementation of a measurable security awareness program can be incredibly beneficial in mitigating cyber risks and threats within a business. A security awareness program should include security news on the latest threats, information posters and regular employee training to enable your employees to detect threats within the business. What’s pivotal to employee security awareness is that they everyone within the business, no matter job role, should be trained on who to report any security threats and suspicious behaviour to.

Asset Management

Asset management is vitally important. Every piece of hardware and software that’s used within your business must be accounted for. If not already in place, the first thing to do is to create an asset register of all hardware and software within the business. Use the register to prioritise the implementation of security controls, starting with the most critical assets first.

How can CYAN help your business?

When it comes to the cyber safety of your business, it’s our number one priority. When you choose Cyan, we follow steps to ensure your business is safe against the ever-growing cyber risks and threats. Here’s how:

  • We start by understanding your business
  • We assess the security maturity of your people, processes and technology
  • We identify risks and provide recommendations
  • We can create and implement a security strategy to reduce risk within your organisation
  • We can provide and manage the latest technology to secure your company assets
  • We can provide the platform and expertise to deliver a security-aware business

For more information on how we can help secure your assets and data, get in touch.

The End of Life for Windows 7

Windows 7 end of life

On 14th January 2020, Microsoft will officially ‘end the life’ of support for Windows 7 and Windows Server 2008 (including 2008 R2); a change that will pose a significant challenge for many businesses throughout the UK.

Not only does 2020 mark the beginning of a new decade, but it also commemorates the end of an era for Windows 7 and Server 2008. Not so long ago, these trusted operating systems were one of Microsoft’s most popular, so much so, that many businesses still use them on a daily basis.

But what exactly does end of life mean for small and medium-sized enterprises (SMEs)? Well, if you continue to use these operating systems after support has ended, your systems will still work, but will become considerably more vulnerable to security risks and viruses. As SMEs represent 99% of all businesses in the UK, there’s potential for a significant number of companies to be effected.

Assessing the Risks

In a nutshell, this rather significant operating system end of life means no more bug-fixes, security patches or new functionality. In addition, Microsoft customer service will no longer be available to provide technical support and related services will also be discontinued over time.

This considerable change, therefore, may cause concern for existing users as the risk of running systems beyond 14th January means that computers and data can become vulnerable to exploitation, hackers and bugs, to name but a few.

Vulnerabilities can be very dangerous as attackers can more easily comprise unpatched systems. Once compromised, the attacker can gain control of the system to steal information and potentially launch further attacks on other IT systems within an organisation’s network.

When an operating system becomes end of life, the vendor will no longer release security updates or patches to remediate any discovered vulnerabilities. This leaves systems at serious risk of being compromised.

Is Your Company at Risk?

It’s vital to assess the risks to business before deciding what action needs to be taken – and, in this case, both the likelihood and impact need to be determined. To achieve this it’s essential to consider the following:

  • Does the system contain business-critical and/or confidential data?
  • Does the system contain any sensitive data such as personally identifiable information?
  • Does the system support a business-critical process?
  • Will running an end of life operating system be in non-compliance of:
    • GDPR
    • PCI
    • Supply chain agreements
    • Insurance policies
  • What would the cost be to the business if the system was compromised?
  • Would the reputation of the business be damaged if the system was compromised?
  • Is the system exposed to the internet, if so, can this be limited or removed completely?
  • Has the user(s) of the system received adequate security awareness training?
  • Do we have the capabilities, including the skills and knowledge to manage the risk?

Once the likelihood and impact have been determined, it’s then about calculating the risk. If the risk is low, it should then be recorded in a risk register and treated to reduce the likelihood of it occurring.

Managing the Risks

At CYAN, we believe that the best option and one that should always be considered before anything else is to terminate all risks by upgrading operating systems to a supported operating system before the end of life date. Which in this case, is 14th January.

However, in some cases, it may be necessary to run a system with an operating system beyond its end of life date. This could be due to several reasons, from budget constraints to a dependency on a legacy application that requires a specific version of an operating system version in order to work. If this is the case, the risk should be assessed and treated to reduce the likelihood of the system being compromised.

But it’s important to note that this should only be a short-term measure while measures are put in place to upgrade to an updated operating system. We know that business survival during a huge change such as this requires having a strong IT security strategy in place.

Effectively Treating Risks

At CYAN, we balance our intricate knowledge of IT with a personal approach to understanding the businesses and people that use it every day. And so, to reduce the likelihood of the risk occurring when Windows 7 or Server 2008 reach end of life, multiple techniques and controls can be applied to treat the risk. There are a number of ways in which this can be done:

Reducing the Attack Surface

Removing all unnecessary applications from the system and only allowing signed and trusted applications to run can effectively reduce the risk. Additionally, isolating the system to a tightly controlled security zone and limiting exposure to the internet can also help to decrease the attack surface.

Applying Patches

First of all, it’s important to know what patches are in the IT realm. A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. So, by applying the final update and security patch from Microsoft, as well as continually keeping all required applications up to date, can significantly treat risks.

Implementing Strong Technical Controls

Use a comprehensive endpoint security solution to protect against malware and unauthorised access and harden the system by disabling unrequired services and system features. Not sure where to start? Speak to us for expert help and advice.

Control Access

You can also prevent access by removing unused accounts and restricting access on a need to know basis. Using strong passwords and multi-factor authentication can also be highly effectively when it comes to watertight access control.

Backup and Event Logging

Regularly performing backups as well as enabling event logging to a safe, secure and restricted location is vital to contain, eradicate and recover from a security breach.

Security User Awareness Training

Within a business, it’s vital to practice safe clicking and carry out regular security awareness training and measure its effectiveness with all members of the team. This is of the utmost importance when it comes to the end of life of operating systems such as Windows 7.

The Next Steps…

While end of life operating systems will continue to work after their end date and additional techniques and controls can be applied to reduce the likelihood of the system being compromised, it’s best practice to terminate the risk by upgrading the system to a supported operating system before the end of life date.

This means the end of regular security updates which puts any system running Microsoft Windows 7 or Server 2008 beyond 14th January 2020 at serious risk. Businesses that use these systems and that have failed to update to newer systems are at risk of severe and very dangerous security breaches.

Skill and Knowledge for The Steps Ahead

It’s worth noting that to manage the risks involved in such a drastic change will require skilled resources and additional time and effort, which isn’t always something that can be carried out within a small or medium sized business. And much like any massive business change, the cost of managing the risk should be weighed up against terminating the risk by upgrading the system to the next available operating system. You might just find that it’s more cost-effective, and ultimately, will be far safer for the business to simply upgrade the operating system.

At CYAN, we have seen security threats from outdated operating systems, unpatched vulnerabilities, and various other security breaches. The longer your company waits to update systems, the bigger the risk becomes of a potentially costly and nasty attack. Please don’t wait any longer, get in touch to find out more about how we can help you with a safe and speedy upgrade.

Wherever your organisation goes after Windows 7, upgrading should be done in a measured and controlled way, and certainly not rushed at the last moment without careful consideration of the impact to business.

The Cyber Security Basics You Should be Covering Now

Achieving full protection when it comes to cyber security risks can seem daunting for even the smallest of businesses. Even if you can’t access the huge budgets that big corporations have at their disposal, there are some basic solutions you can put in place to protect your business.

5 Cyber Security Basics You Can Implement Relatively Cheaply

Even if you are a small or medium-size business with a very limited budget, there are a number of solutions which need to be implemented with relative immediacy.

1. Understand What Assets Are At Risk

We use a wide range of devices to access software and the internet nowadays. You might use a desktop in the office, a laptop at a local café or a smartphone or tablet while on the move. Software and data is no longer placed on a protected server within the organisation but can be accessed from anywhere in the world via the cloud.

Our assets when it comes to cyber security are more wide-ranging and, in some cases, can seem quite nebulous, than ever before. They are all, however, vital to daily operations and need to be protected. It’s important to know what you use and how it might affect your online security.

That means carrying out a regular inventory:

  • What hardware such as desktops, laptops and smartphones do you have?
  • If you use remote workers to support your business, how are you connecting to them and protecting data?
  • What remote or local servers are you using?
  • What cloud services are you and your staff employing?
  • What virtual machines are you using? What software?

This inventory gives you the basis for understanding your cyber security risks and needs. For example, you may allow BYOD in your business which can present specific challenges when you incorporate your software and data sharing onto someone’s private device.

2. Fill in the Gaps

Once you do an inventory, the likelihood is that you will spot areas where your security isn’t covering your business as you might like. This can happen for a variety of different reasons:

  • You may not have implemented a cyber security solution in the first place.
  • There might have been a solution, but it was turned off by someone using the software.
  • You might already have been the victim of a malware attack that turned the security measure off.

Once you know where the problems lie, you have the chance to put things right and repair your system so that it works more effectively.

The more assets that you use in your business, the more complicated it can be to address all the issues, especially if you are short of time. That may mean outsourcing your IT to a third party who can ensure the gaps are plugged, allowing you and your teams to focus on the business. The key here is that plugging the gaps in your security should be a priority.

3. Auditing Permissions

Who has access to the vital parts of your business? Most companies will limit permissions depending on what job someone does and their position within the organisational structure. These are often not monitored closely enough which means that the potential for a cyber security breach increases. For instance, if someone gives another person their password to access important information, it is putting your business at risk.

It’s also important to check things like user passwords and how these are managed:

  • Are they robust and are they changed at regular intervals?
  • Do some people have access to more areas in your business than they really need?
  • Are there old accounts still operational even though staff have left the business?

Checking permissions on a regular basis is important and will ensure that everyone has the right access and security is kept intact.

4. Developing a Cyber Security Policy and Implementing It

It’s important also to have a cyber security policy for your business, even if you are an SME. The purpose of this is to provide the framework on which all your company security works.

It should include clear guidelines on how employees should behave online, how they use your data and software, who is responsible for ensuring compliance, and what you need to do in the event of a breach.

Even if you do have a cyber security policy in place, it’s vital to ensure that this is being implemented properly. That means having a regular audit to check processes are being adhered to and any changes that need to be made are actually being made and recorded.

For example:

  • You may have run a training session to make staff aware of your cyber security policy and what is expected of them. But have you onboarded new employees properly? Do you need to provide a refresher session?
  • Is the person who is responsible for implementing certain parts of your cyber security policy doing it properly? Do they need further training, or do you need to change personnel?
  • Are there things that need to be added to your cyber security policy following changes in the operation of your business?

5. Embrace Automation

Finally, it’s important as much as possible that you don’t leave your cyber security at the mercy of human error. That includes making sure you have automatic updates and patch downloads for devices rather than waiting for employees to do it themselves. Automation not only reduces human error it can save time and money as well.

When you undertake your audit, do it with a mind of looking for areas where you can include automation.

Cyber security is most certainly a big challenge to businesses, particularly SMEs. These small steps should help tighten up and streamline your current posture and keep you safer online.

If you’d like to find out how a fully managed, tailored IT support service can benefit your business, contact the team at Cyan Solutions today.

What to Include in Your IT Strategy in 2020

It can be easy to focus almost exclusively on your business sales and how many customers you need to find over the next 12 to 18 months. One area that needs just as much attention is your IT strategy, in particular how it aligns and supports your business goals.

For a start, too many companies, especially small to medium size businesses, look at their IT support as a static part of their operation.

In fact, any IT strategy needs regular review and must move with the times and challenges to remain relevant. It’s not just about what cyber security measures you have in place either, but the whole integration and functioning of your digital infrastructure.

An effective IT strategy will deliver a number of different benefits:

  • Enhance the overall security posture for your business online.
  • Improve ROI and boosting sales.
  • Embrace new technologies to improve business processes.
  • Spend less time worrying about your IT and more time growing your business.

Undertake an IT & business goal audit

Before you can put together a realistic IT strategy, you need to understand where your business currently sits. A needs assessment or audit is designed to highlight the areas where you may have shortcomings or might want to update or evolve your systems. It can also show where your IT is working well.

This can be a lengthy process depending on the size of your company but will give you a firm basis from which to develop future plans.

What you need at the same time, however, is to align your future IT strategy with your business goals. The more you understand the synergy between your business goals and your future IT strategy, the better equipped you will be to grow and succeed for the future.

Your IT audit should cover a number of areas:

  • What is the purpose of your IT strategy? How long does it cover and who are the important stakeholders involved in its implementation?
  • Look at what current technology you use, assess its life expectancy and create a clear inventory.
  • Look at what technical solutions you ideally need in place to support your business goals over the next few years. For example, if your aim is to reduce office costs and include more remote workers, you may want to look at file sharing and collaboration cloud-based software for your business.
  • You will need to allocate a realistic budget for the existing provision and any changes you need to make to provide your IT support.
  • There are going to be limitations on what you can do depending on that budget and you should also understand how to work within these.
  • If you are introducing new IT systems, one key factor is going to be how you implement them – What disruption is there going to be? How long is it going to take? What training do staff need?
  • It’s important to build a framework where everything comes together including timelines for implementation and how you measure success. The better your metrics are here, the more efficiently you should be able to implement any changes or improvements to existing IT infrastructure.

Cyber security considerations

One area you will certainly need to be focused on in 2020 is cyber security. There’s no doubt the challenges are increasing in this area and keeping up to date is vitally important. Smaller businesses tend to assume they are less at risk from cyber security attacks than large corporations. Nothing could be further from the truth – SMEs are seen as a prime target because they are often less protected.

You need to include a review of your current cyber security measures in your IT strategy and look at how these can be strengthened. With advances in cloud services and AI you also need a service that is flexible and easily updated.

  • How do you defend your systems from cyber security risks?
  • What systems do you currently have in place and are these fit for purpose?
  • What processes do you have in place for training staff on potential cyber security threats?
  • How do you deal with third party suppliers and the security threat they may pose?

At the very least, your IT strategy needs to include a comprehensive examination of cyber security risks and how you intend to deal with them in 2020. That’s even more important in light of the new General Data Protection Regulation and legal requirements all businesses have to meet.

Opting for on-demand services

Things have changed when it comes to IT and many businesses nowadays opt for third party on-demand solutions. These can include everything from cyber security to cloud computing and digital storage.

What this brings is the ability to tailor your provision and budget better in running your business. Most services are eminently scalable so if you suddenly see a surge in growth you will have systems in place that can react efficiently and appropriately.

If you are searching for flexibility, scalability and efficiency in your IT strategy, switching to a subscription-based solution is going to make a huge difference.

Automation and AI can make life easier

It’s the general point of IT to make it easier for a business to operate. Putting aside the cyber security support you might hope to achieve, your infrastructure needs to take advantage of the various digital transformations that are taking place at the moment.

Key to this is the growing inclusion of automation and AI in digital processes. This is particularly important for smaller businesses that want to compete with bigger companies but lack the resources to do so. AI can help, for example, with delivering a great customer service experience. Automation can mean your business doesn’t have to rely on staff to do often menial but important tasks and can even replace roles completely.

Your IT strategy for 2020 should be exploring all potential avenues and matching them to your current business goals. Put the right processes in place and they should help to move your business forward faster than you think.

Working with a great IT support service

An IT strategy can be complex and demanding to put together. That’s why it’s important to work with an IT service provider that understands business and can help you implement the core changes that are going to make a significant difference to your performance over the next 12 months.

At Cyan, we have a track record of helping businesses of all sizes match their goals for growth with their IT strategy. Contact us today to find out more.

What Does Digital Transformation Mean for Your Business in 2020?

There’s no doubt that the world of business has changed dramatically over the last twenty years. Our reliance on the digital platforms from websites and apps to pay per click advertising and social media, means that marketing to the general public is now a much more complicated affair.

Businesses have ready access to cloud IT, productivity software and a range of communication tools that, just a few years ago, would have been inconceivable to many.

What is digital transformation?

When a new digital technology comes along, you have the choice of ignoring it or using it to improve your company processes. Digital transformation generally causes some form of disruption.

Cloud services, for example, have reduced the burden of having in-house IT infrastructure. It’s given on-the-move access to important software and communication tools – staff can work remotely and have everything they need because their smart device holds the latest tools.

The disruption this form of digital transformation creates can be seen in the way many businesses are now confident employing remote/home workers to save on traditional office costs.

What does digital transformation mean for your business?

The challenge and potential of digital transformation is not so much about new software and upcoming innovations, however. It’s how your business incorporates them into its procedure, how it chooses the right tools at the right moment and how it ensures that this is all fit for purpose at both a strategic and implementation level.

Get it right and digital transformation has a number of distinct advantages:

  1. Staying Competitive
    The vast majority of businesses do not exist in a vacuum. A new technology that comes to market and makes processes more efficient may be taken up by your nearest competitor giving them a big advantage. If they are using AI to keep customers informed and happy, for example, and you are not, they’re stealing a march because their reputation is being enhanced.
  2. Becoming more productive
    One of the key reasons for undergoing a digital transformation is to make your business more productive. There is no advantage in reinventing the wheel but if that wheel is longer-lasting, improves fuel efficiency, and comfort, then it’s worth focusing on.Software like Office 365, online file-sharing and collaboration apps, and bespoke CRM’s are all examples that highlight how digital transformation has streamlined work processes and allowed businesses of all types, including start-ups, to become highly efficient and competitive in the market place.In many businesses nowadays, for example, the workforce is not contained within one office but spread throughout an area, with employees operating remotely – saving on hardware and staffing costs.
  3. Increased revenue
    At the root of all digital transformation is increased revenue for the company concerned. Whether that’s from making processes efficient and reducing staffing costs or through improving marketing communications with customers to boost sales, the single biggest factor in making a change is that all-important bottom line.
  4. Better customer relations
    Developments in AI in recent times have allowed businesses to reach out and communicate with existing and potential customers in new and innovative way. This is one area that will continue in the next few years. Another digital transformation is the variety of ways in which those customers can pay for products or services.

Staying on top of digital transformation in 2020

The challenge that all businesses have had is when and how to implement any relevant digital transformations. In 2020, this is set to remain a hugely important factor and one which will become increasingly difficult as technology evolves. Working closely with your IT service provider is going to be imperative and choosing the right moment to expand and implement will be vital.

Here are just a few of the ways digital transformation is going to have an impact in 2020:

  • The potential of 5G
    5G is finally rolling out and will take us to the next level when it comes to connectivity. Users will see faster download speeds, up to 20 times 4G. This is likely to revolutionise remote working and make it increasingly important for businesses that are trying to keep down their operational costs.5G will also feed into areas such as AI and the Internet of Things but the full impact may not be seen in business for a few more years. What you should see, however, is an increasing number of options, so keeping up with the latest tech developments is going to be vital.
  • AI and customer service
    Chatbots have had mixed reviews over the past few years and not everyone is keen on them. Businesses have found, however, that a reliable AI help service will deliver answers on the most asked questions for customers and can be a powerful time-saving tool.According to Gartner, nearly half of businesses will start to invest more in AI to streamline processes and provide a better service to customers in 2020. The good news is that those customers are also on board – we’re more focused on getting the answer we want than worrying whether we’re talking to a bot or not.
  • Analytics and staying competitive
    Analysing how your business is performing is key to success nowadays, especially online. One area where digital transformation has improved things over the last decade or so is with the various analytics packages available that provide telling insights into content performance and customer behaviour.We are now in the age of big data and the information that this provides can be seriously transformational if your business is able to leverage it effectively.
  • Security, privacy and transparency – your customers want it all!
    With the implementation of GDPR, there is a lot more pressure on businesses to ensure they have the right security measures in place. Cyber attacks are on the increase and customers expect the companies they do business with on a daily basis to protect their data.But customers also want your business to be open and transparent about what you do with that data. The challenges facing even small businesses nowadays means that a comprehensive cyber security and data protection policy is not simply something on a wishlist but an urgent necessity and one that is legally required.

Putting digital transformation at the heart of your business

Digital transformations are exciting and full of potential. But how do you know if the next innovation is right for your business? Is it best to implement something straight away and steal a march on your competitors or wait and see what the impact and advantages are?

It’s not easy for businesses to forge ahead with changes of this kind. Digital transformation generally needs money and time to implement, staff have to be trained, the effectiveness measured and changes made to adapt conditions to the needs of the business.

From IT transformation consultancy to robust cyber security, Cyan Solutions have the team in place who can provide a tailored approach to your next digital transformation challenge. Contact us today to find out more.

IT Security Strategy: What You Need to Know

Most businesses are critically dependent on the internet. Survival means having a strong IT security strategy in place. The hacking of telecommunications giant Talk Talk in 2015 reminds us that it’s not just smaller businesses that are at risk either.

The Government has taken steps to build a national cybersecurity strategy and this acknowledges that threats can come from many different sources: foreign governments or state sponsored actors, terrorists, hackers, hacktivists concerned about a particular issue, and even insiders, people who work for a company and who have a grievance of some sort.

Protecting your business has never been more important or more challenging. Having the right tools and processes in place is key if you want to stay safe.

How to Develop an IT Security Strategy

The digital landscape has become increasingly complicated over the last couple of decades. Businesses will not only operate online through portals and third-party sites but use tools such as social media to market their services and products. On top of that, they will have key IT requirements within their office environment that need solutions. Many will use remote working and promote collaboration and better communication through cloud-based services.

All this means that there is no clearly defined, one-size-fits-all IT security strategy for modern businesses.

1. Understand What You Have

The first major step to developing the appropriate IT security strategy is defining what you are trying to protect in the first place. Yes, you may have lots of customer and employee data but what about documents relating to your business such as your plan for the future or a new product you are intending to bring onto the market?

To make sense of everything, you need to understand what each asset is and clearly define its value to your business.

2. IT Security Risk Assessment

The next part of the process is to look at the current state of your IT security in relation to these assets and whether it fulfils its purpose. A risk assessment looks at a range of different aspects of your business, including the software you have in place, who has access to data, what they do with it when they are using it, and what protocols other than digital that you have in place to ensure security.

3. Elements of Strong Cybersecurity

The Government has produced a useful infographic (download here) relating to IT security which includes 10 steps all businesses and organisations should be taking:

  1. You need to implement a risk management regime that allows you to regularly review your cybersecurity processes.
  2. You must protect your network from attacks using anti-virus software and other technological solutions.
  3. You need a process in place to educate users and build awareness through activities such as staff training and the production of easy to follow practices (such as having a definitive password policy for your business).
  4. You need to establish anti-malware practices and defences to protect your business like having the appropriate software and educating staff on threats such as phishing emails.
  5. You need to limit or control the use of removable media such as flash sticks which can hold malware.
  6. You need to update your systems when a new patch or update is available and ensure they are configured properly across your whole business.
  7. You should carefully manage user privileges particularly for parts of your network that have access to sensitive data.
  8. Your business should have a process in place for handling any breach incidents or disaster recovery and be able to test these plans. If you lose data for whatever reason, being able to get up and running again may be vital to the survival of your business.
  9. Your business also needs to have in place a system or protocol for monitoring your IT and cybersecurity, producing reports and understanding if you are at risk of attack.
  10. You need to develop a policy for home and mobile working especially if you advocate using BYOD. Your company needs to create a secure baseline for all devices and build this into its cybersecurity activity.

While many businesses will be able to implement some of these measures, it can be challenging to get them all in place. That’s why it’s important to work with an IT and cybersecurity specialist to make sure all the bases are covered.

At Cyan Solutions, we have the teams in place who will be able to help you develop a robust IT security strategy that will safeguard your business now and in the future. Contact us today to find out more.

Essential Recommendations for Business IT Security

One of the key factors that effects almost every business with a digital profile is IT security. It’s a constant challenge to get right whether you are a small start-up or a large corporation.

Unfortunately, there are organised criminal gangs in this world who are fixed on trying to do us harm. It’s something that has been with us since the birth of the internet.

The biggest question we get asked at Cyan Solutions, is what best practice can be employed to ensure better business IT security.

Here’s a list of things you can do right now to help protect your business:

1. Don’t Assume It Won’t Happen to You

This is something we find with many SMEs. They think they’re too small for hackers to worry about. It’s simply not true.

Most attacks come through automated delivery such as Phishing email. The hackers and malware developers are looking for someone, anyone whose system they can get into. Whether you are just a one-person outfit or have many staff, treat cybersecurity with the same level of seriousness as you do other aspects of your business.

According to a recent report by Verizon, 71% of cyberattacks happen to smaller companies with less than 100 staff on the payroll. That is in part because there are more of them but the clear message is to be aware and have robust cybersecurity policies in place.

2. Use a Firewall

The first line of defence against cyberattacks is an effective business-grade firewall. Think of this as a barrier that repels common attacks and prevents malicious threats getting to your network. Companies often neglect to invest in this area as they don’t understand the importance of good perimeter security. They assume a generic router does the same job, it doesn’t. You need to improve network security measures if you want to remain safe online.

And, it’s not just external firewalls that are important – if you have sections of your network that contain sensitive data, for example, you may want to protect these with additional cybersecurity measures.

3. The Challenge of BYOD

Bring Your Own Device (BYOD) has largely been accepted in the business world over the last decade after some initial reticence by employers. It can often be easier for an employee to use their own smartphone or tablet or even laptop to do their work.

The trouble is that these are not generally as secure as the hardware and software that you have for your business. Staff can download the wrong apps or visit the wrong sites that open them (and your business) to potential cyberattack.

This is something that is unlikely to change in the future. BYOD offers too many benefits. The challenge is to make sure that mobile devices are updated with the right security and that staff understand their obligations.

4. Having Comprehensive Cybersecurity Policies

This brings us to the strategy for your cybersecurity protection. All businesses, whatever their size, need to have a robust set of policies that staff can adhere to. Many smaller companies do this in an ad-hoc manner which can mean their business IT security is missing vital core components. Ensure that you document your policies and make them readily available to all members of staff – including senior managers and executive teams.

5. Password Protection

It might seem like a simple thing to include in a best practice list but passwords are a real issue for businesses. Enforcing a robust policy in this area is important and could well protect your business from cyberattack. Passwords should ideally include upper- and lower-case letters, symbols and numbers. For more sensitive areas of your business, you also want to consider multi-factor identification.

It might seem like a simple thing to include in a best practice list but passwords are a real issue for businesses. Enforcing a robust policy in this area is important and could well protect your business from cyberattack.

Passwords – when implemented correctly – are an easy and effective way to prevent unauthorised access to systems. Always change the default password that comes with a new device.
If two-factor authentication is available, make sure it is enabled and use it. A common and effective example of this involves a code sent to your smartphone which you must enter in addition to your password.

6. Educating Staff

One failing, particularly for smaller businesses, is not educating their staff on the right IT security protocols. There’s plenty of evidence to suggest that, even if a company has a password policy in place, in the majority of cases it is not enforced.

You have to bring your staff into the loop and make sure they are well educated with regards to cybersecurity risks. For example, User Awareness Training is a great way to educate staff to the dangers of email threats, such as Phishing attacks, which are not always easy to identify.

7. Regularly Update Your Devices and Software

It’s quite worrying the number of small and midsize businesses that do not make the effort to patch their systems, devices and software. Manufacturers release regular updates which not only add new features, but also fix security vulnerabilities that have been discovered. Applying these updates (a process known as patching) is one of the most important things you can do to improve security.

8. The Right Level of Protection

Finally, the fight against cyberattacks is a never-ending battle and you should have the appropriate virus and anti-malware software in place which is regularly updated. One big mistake businesses make is to assume that standard anti-virus software alone is adequate protection for their needs. How security should be tailored to better protect your organisation is something you need to discuss with your IT provider. Understanding what threats are targeting and putting additional layers of security in place to protect against them is an essential part to any cybersecurity strategy.

At Cyan Solutions, we deliver cutting edge IT services and support. If you want access to the best cybersecurity expertise for your business, tailored to your needs, contact our team today.

What is a Typical IT Budget for a Small or Midsize Business?

Small and medium sized businesses (SMB’s) can struggle to put a figure on their IT budget. There are a lot of factors involved in developing a solution that works, not least the industry or sector, the amount of data and how it is currently controlled, as well as the various types of technology being used.

Most SMB’s have to weigh the benefits of including new technology, the potential risks to their growth if the right measures are not implemented and even their position in the marketplace.

If you are an e-commerce business, your IT requirements are going to be different from an insurance company. A business with 3 or 4 staff will have considerably less IT costs than one with a 50 or 60 or more.

How Much Should You Spend?

A lot is going to depend on the context of your IT supply and what you want from it. The first thing to say is that you should treat IT as an investment not simply the need to have set of tools to keep you safe or enable communication.

Effective IT can have numerous benefits, including:

  • Helping to streamline your business operation, including in some cases automating tasks. Boosting your agility means you are able to respond to challenges in your sector as well as give yourself the best chance of growing.
  • The latest cloud packages allow staff to operate remotely. That means you have more flexibility in your workforce. This in turn means you can encourage greater productivity as well as strengthen your networks.
  • Improved cybersecurity will ensure that you keep data and other important information safe. It will also benefit your reputation with consumers.

For a business that has no internal IT department but has about 40 employees who all rely on IT, you will be looking at an average monthly spend of £2,000-£3,000. This can actually purchase you a good deal of tech support in today’s competitive IT environment.

On the whole across all sectors, the average SMB will spend about 6-7% of its revenue on IT. There are some important areas where you should be concentrating your IT budget:

1. Replacing Old Software

Many businesses stick with the same old software way past the time it has outlived its usefulness. This is generally a false economy especially when it comes to collaborative packages that allow your staff to work more productively. Picking the right time to switch to an upgraded version of a software package or try something new entirely is a huge challenge for SMB’s.

2. Old Hardware and Old Operating Systems

Another decision that can have an impact on your business is the age of the hardware systems that you have in place. Old desktops that no longer update can present a risk not only to that particular machine but your entire network. Vulnerabilities in older operating systems such as Windows 7, which will have support terminated in 2020, can present immediate danger to your business if the hardware is not updated.

3. Cloud Computing

The cloud seems all the rage nowadays and for good reason. Cloud services have changed the way many SMB’s do business. They facilitate more efficient collaboration and access to data which can greatly improve productivity. If your business uses remote employees who work from home or you have sales staff that need access to information on the road, cloud computing is indispensable.

4. Outsourced IT Support

With the advent of cloud services, we’ve seen a substantial rise in remote IT support solutions that are specifically designed for SMB’s. Not only has this allowed the typical IT budget to come down, it’s given many businesses a more level playing field on which to compete.

The good news is that outsourced IT support is a lot cheaper than employing staff on site and can deliver a wide range of expertise. It can also be tailored to your needs at any particular moment, scalable whether you want to grow or if you need to shrink your business model and your IT.

Tips for Controlling Your IT Budget

Compared to larger corporations, SMB’s have to do a lot of work to keep their IT support costs under control while still delivering on their needs. It’s important to make sure that you have the right components in place.

  • Have a regular audit to highlight where your IT can be improved or even rolled back.
  • Be prepared to embrace new tech if it can help reduce your running costs in the long term.
  • Think of IT as an investment not a drain on resources.

At Cyan Solutions, we work with SMB’s across all sectors and industries. If you want to make better use of your IT budget in the future and really deliver transformational results, contact our team today.

Does Outsourcing Mean IT Cost Reduction

Any business worth its salt will have a close eye on reducing costs at all times. One area that presents a particular challenge here is IT. Keeping data and infrastructure safe is important but so is having the appropriate software and services in place to help your business work productively and safely.

But is outsourcing the answer to all your worries and does it deliver an IT cost reduction?

At Cyan Solutions, we take a closer look.

What is IT Outsourcing?

Back in the old days, any business setting up would need to get an IT infrastructure in place, usually on site. Large corporations spent millions developing IT support services that could handle everything from computer setup to internal server issues.

Gradually, over the last ten years, third party suppliers of IT services have become increasingly popular. These have developed mainly as a result of our improved connectivity. It means you can set up a remote IT service element which operates separately from your business but delivers all the expertise and technical support that you need on a day to day basis.

The Benefits of IT Outsourcing

There are numerous advantages of using a third-party IT support service. The first is that you get the expertise you need on demand. If you were employing an in-house IT team it could cost you thousands of pounds a year just for one person. Not only that, you might not get the full expertise that your business really needs.

Outsourced IT companies provide services to many different clients which means they are able to take on a wide range of experts to help solve particular problems.

If you have a small to medium size business and are looking to grow, developing a plan for your IT to meet your needs can be a huge challenge. Outsourcing enables you to scale up and down as and when you need it. As long as you find a flexible and responsive partner, you can quickly alter your service and tailor it closely to your requirements.

The truth is that we live in a fast-paced world when it comes to technology. It was only about 15 years ago when most people connected to the internet via a clumsy dial-up connection and just over 10 years since the first smartphone hit the shops and broadband started to become such an indispensable thing in our lives.

When you think about how much has changed, and how much we take our connectivity for granted, you begin to see the developments that could come in the next few years. It’s important to keep up and ensure your business has the IT support it needs. This can often only be delivered through effective outsourcing nowadays.

IT Cost Reduction: What It Means for Your Business

Businesses require much more IT support than someone with a simple home broadband connection. Speed, for example, may well be a priority for your business. Your cybersecurity needs are going to be of a higher level and your access to software will essentially determine how productive you are able to be.

IT cost reductions and savings come from a number of areas when using outsourcing:

  • You can tailor your IT provision to suit your needs, depending on the budget you have.
  • You can use money saved in employing in-house IT experts to further develop your business.
  • You can scale your IT support to suit your needs, improving it as your customer base and business grows.
  • You get to rent the top talent you need only when you need it. If there’s a specific problem with your IT infrastructure or a challenge ahead, you hire the expertise you require for a specific time at a fraction of the cost.
  • Outsourcing your IT service will also lead to cost reductions because your business is better protected. Your IT support will ensure you remain on top of the latest threats, reducing the risk of your systems being compromised. That in turn should boost your reputation as a safe company to deal with.
  • An outsourced IT service can also help you improve productivity by making sure you have the appropriate software in place for your business needs.

Finding the Right IT Partner

Of course, the big challenge here is finding the IT support service that not only delivers on your current business needs but helps you plan for the future. At Cyan Solutions, we have the experts onboard who can make a real difference to your growth and future security.

Whether it’s cybersecurity, IT support, a virtual CIO or cloud services, we ensure your business stays connected, safe and productive at a cost you can afford. Contact our expert team today to find out how we can help transform your business.

IT Budget Planning Mistakes You Should Avoid

There’s no telling when rising costs can start to get the better of your business. That’s why it’s vital to make sure you budget properly. That goes whether you are a small business with just a few employees or a large corporation with thousands.

If you’re a company that wants to stay ahead of its competitors, one thing you will certainly need to focus on is your IT budget planning. It’s pivotal to ensure you are able to deliver great services to your customers and provide the tools that your staff need to promote your business and drive it forward.

It’s not all plain sailing, however. There are plenty of pitfalls that can siphon off elements of your budget, leaving less for more important areas of your business. To help out, the team at Cyan Solutions have put together a list of the top budgeting mistakes you will want to avoid.

1. Not Fully Understanding Your Needs

Whether you are planning a digital transformation, want to up your cybersecurity posture or simply want to migrate your business operation to the cloud, understanding what each move entails and why you are doing it is important.

Many of the businesses we come across, treat their IT as a piecemeal thing rather than a series of interconnected dots that create a whole. Before you go about IT budget planning, your first step is to list the components of your current provision and decide what purpose each serves. Then you can begin to look at what you want to add to make your business more secure, more productive or more efficient.

Aligning your IT needs with your business needs is imperative. Making sure that your tech spend is heading in the right direction to support growth and revenue is not always an easy thing to do, however.

2. Budgeting and Timeline

This is a common issue with many businesses operating on a fairly restricted budget. It can mean you end up budgeting from month to month rather than looking at 1 year, 2 year or even a 5-year projection. That also means you are unlikely to have an IT budget in place that can help service you if you intend to grow. Try to see as far ahead as possible and understand what your costs are and how you are going to meet them.

3. Not Being Ready for Changes

It’s all well and good spending money on new technology but a huge mistake businesses make is not ensuring they are good to go when it is finally in place. An example of this would be if you were planning to migrate your operational procedures and other IT to the cloud so that it can be accessed securely from anywhere. If you haven’t trained your staff for using this new approach and you haven’t considered other issues such as your online security, you could be wasting money and not delivering a decent ROI from the outset.

Moving to the cloud has more benefits than simply cost savings and businesses need to be aware of this while deciding what their priorities are. If you are a company that has busier periods during the year (for example, Christmas), being able to up your capacity at this time can be of huge benefit and that’s something moving to the cloud can facilitate.

4. Choosing the Wrong Software License Plan

Software-as-a-Service, or SaaS, subscription licensing (eg SalesForce, Microsoft Office 365, Google Apps) has now become the norm for most companies. What businesses often fail to do, however, is understand their actual license needs, which often means they over commit and, inevitably, overspend. A team of sales people, for example, will have very different needs to teams working in operations or finance. Some users may just need access to online tools, others will need the full suite of features. Identifying which license plan suits each role in your business could save you significant costs in the long term.

5. Tech and Value

It can be tempting to get the latest bit of tech, just because everyone else is doing it or because you’ve seen an ad somewhere. Business owners looking to improve their efficiency or add value to their customers, bring in new technological solutions without truly understanding whether they are adding value or not.

On the other side of this is making sure that the software and IT services you are currently using are actually still providing value for money. For businesses, especially smaller ones, this can be a difficult balancing act to get right, especially if they have new technology that impacts on the performance of older software.

In a rapidly changing world where new tech is appearing almost daily, it is difficult for businesses to keep up. While sticking with tried and tested solutions can seem financially sensible, there always comes a point where that more advanced technology has to be given some breathing room.

At Cyan Solutions, we provide a range of IT support and services for businesses across the UK. If you’d like to find out how we can help support your next round of IT budget planning, contact the team at Cyan today.