Aztech-Welcome

The AZTech IT Blog

IT Industry News, tips and tricks and the latest AZTech IT news

Cyber Security Starter Guide for SMBs

Posted by Sophie Ashwood | 30-Oct-2019 10:58:20

Keeping your business secure can seem like a daunting task for small businesses, which is why we’ve put together this quick and simple guide to help you begin securing and protecting your business.

1. Back Up and Data Recovery

Backing up your data is one of the most important steps in keeping your business data secure. If you think about your business data, such as customer information, projects you’ve spent months working on, or payment details and quotes, imagine how long you’d be able to continue working if you lost this data.

Scheduling regular backups of your important data allows your business to recover quickly after a cyber attack or natural disaster.

There are a few solutions you can do to ensure business continuity and protection of your assets:

  • Continuity Planning
    We’ll work with you to create a bespoke, ready-to-run, recovery plan that can help you get back on your feet as soon as possible.

  • Cloud Backup
    We can create comprehensive, secure cloud backups to protect your data for servers and workstations.

  • Co-location Services
    We’ll assist you to secure your critical elements and get them off-site, so they are able to survive any event.

2. Protect against Malware

Malware is short for ‘malicious software’, it’s a generic term used for any software that’s been purposefully designed to disrupt, cause damage or gain unauthorised access to your IT equipment, such as your servers or network. Here are 3 tips to help you begin protecting against malware:

Software and Firewalls
Your antivirus and firewall software are your first line of defence against malware – they’re designed to routinely check for the presence of malware and malicious activity, containing and removing any attacks. It’s essential that you keep both installed, turned on, and up-to-date so hackers can’t take advantage of any vulnerabilities in previous versions.

Restrict downloads
Make sure your staff can’t download suspicious apps from third-party sources on both desktops and mobile devices. Your employees should only have access to tools they require for their role, anything else will need to be approved by an administrator before it can be downloaded.

Keep your software and hardware up-to-date
Out of date software and equipment put your business at a higher risk of a cyber attack. Make sure you keep everything up-to-date with the latest security patches, and enable auto-updates so you won’t need to worry about it in the future. If your software or equipment reaches its end-of-life and no longer receives updates, you will need to consider replacing it – but don’t worry, you will usually receive plenty of warning before your software or hardware reaches the end of its supported life.

3. Password Protection

Your devices contain business-critical data, personal information of both you and your clients, as well as your online accounts, which is why passwords should be used on all devices, be it desktops, tablets or mobile phones.

Multi-Factor Authentication
Also known as two-factor authentication or 2FA – this adds an extra layer of protection to your accounts. It can be a code sent to you phone, a randomly generated code from a token or even your fingerprint.

Avoid simple, easy to guess passwords
We’ve all seen the articles about the most used passwords being ‘password’ or ‘1234567’ – but make sure your passwords aren’t something cyber criminals can easily find on your social media or from your job title.

Default Passwords
Make sure you change your default passwords as soon as you can. Devices and software should also be checked regularly to see if the default passwords have been updated.

How can we help?

We can help you and your business plan for the worst – we can protect your assets and help you reduce downtime so you can recover quickly if your business suffered an attack or natural disaster.

Business continuity and disaster recovery isn’t just for cyber security, it’s to ensure your business can continue no matter what happens.

If you’d like to find out more about what you could be doing to protect your business’ future, get in touch today and we’ll be happy to help.

Get in Touch

Topics: cybersecurity

Written by Sophie Ashwood

Marketing Executive at AZTech IT Solutions

Subscribe to the Blog!

Free IT Healtch Check