lead-forensics

5 Signs of weak enterprise security

As the number of cybersecurity threats increases, many business owners have no recourse but make cybersecurity a priority. But how does one know if your security measures are actually keeping your enterprise IT assets safe? Here are five ways you can tell if your security isn’t sufficient.

Open wireless networks

With one main internet line and a couple of wireless routers, a whole office can go online. A wireless internet connection saves money, but there is an inherent risk that it’s an unsecure network.

If you need a secure network, plugging in a wireless router and creating a basic network is not enough. If you don’t set a password on your routers, then anyone within range can connect. With fairly simple tools and a bit of know-how, hackers and criminals can start capturing data that goes in and out of the network, and even attacking the network and computers attached.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with strong passwords. Many internet service providers that install hardware when setting up networks will often just use an easy password for the router, such as the company’s main phone number. These need to be changed.

Email is not secure

Most companies that have implemented a new email system in the past couple of years will most likely be secure. This is especially true if they use cloud-based options or well-known email systems like Exchange, which offer enhanced security and scanning.

The businesses at risk are those using older systems like POP, or systems that don’t encrypt passwords (what are known as “clear passwords”’). If your system doesn’t encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and compromise your systems and data.

If you are using an older email system, it is advisable to upgrade to a newer one, especially if it doesn’t use encryption.

Mobile devices that aren’t secure enough

Mobile devices offer a great way to stay connected and productive while out of the office. However, if you use your tablet or phone to connect to office systems but don’t have security measures in place, you compromise your networks.

Imagine you have linked your work email to your tablet but don’t have a screen lock enabled, and you lose your device. Anyone who picks it up will have access to your email and all your sensitive information. The same goes if you install a mobile device app with malware on it. Your infected device will spread this malicious program to your entire network and cause major disruption to your business.

Take steps to ensure that employee devices have adequate security, such as passcodes, and that your company has sufficient security policies in place to govern their use. Lastly, mobile device management solutions are specifically designed to prevent your bring your own device (BYOD) policy from being a risk with employee devices causing havoc to your network.

Anti-malware software that isn’t maintained

These days, it is essential that you have anti-malware software installed on all devices in your company, and that you take the time to configure these properly.

It could be that scans are scheduled during business hours. If you install these solutions onto your systems and they start to scan during work time, most employees will just turn the scanner off, leaving your systems vulnerable.

The same goes for not properly ensuring that these systems are updated. Updates are important for software, especially anti-malware applications, because they implement new databases that contain recently discovered threats and the fixes for them.

Therefore, anti-malware software needs to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

Lack of firewalls

A firewall is a network security tool that can be configured to block data traffic from entering and leaving the network. For instance, it can protect data from being accessed from outside the network. While many modems or routers include firewalls, they are often not robust enough for business use.

What you need is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like a managed services provider (MSP), in order for them to be most effective.

How do I ensure proper business security?

The best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you set up proper security measures in place and that they are managed properly. Tech peace of mind means your focus can be on creating a successful company instead. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.
Adam Headshot

Adam

Help Desk

Adam was in the Navy before he joined our team in 2015. He is cool under pressure and a calming influence on the help desk. Perhaps this is because, after staring down Somali pirates off the coast of Africa, printer and email problems don’t seem so intimidating! Adam likes to shoot things (not people – thought we should make that clear), play Xbox, and of course, shoot things on Xbox! A husband of fourteen years with two children, he has been all over the world and still calls Central Texas his home. His teammates say, “Adam has an incredible memory when it comes to our clients. He remembers names, Internet settings, applications and printers!”
Headshots Tyler thegem person

Tyler

Projects Team Lead
Tyler cut his technological teeth through four years both in part-time work and in working with one of our telephony partners. Tyler loves working and learning, and has built a larger network at his home than 90% of our clients have in their businesses! He is thoughtful with his own money, preferring to buy a home and drive an old truck rather than pay rent and car payments. His hobbies of woodworking and gardening dovetail nicely with home ownership! He’s been known to play a bit of electric guitar, he enjoys 3D modeling and printing, and drives a gray Mustang GT that he’s modded as completely as his computers! Several of our team were in the wedding party when he got married!
Headshots Aaron thegem person

Aaron Johnstone

Help Desk Manager
With more patience than Job and more experience than most people in IT today, Aaron is the go-to guy for challenging problems. He directs our team both in the maintenance and help-desk functions. Aaron has been in IT for over twenty years and has played nearly every role possible EXCEPT, he reminds us, Sales. We can test almost every system in our client base on Aaron’s home network because it’s extensive and complex. When he isn’t tinkering with computers, he loves to read, play video games with his kids, and run. Aaron’s been married to his wife for twenty-one years and they have two daughters and a son. His teammates say, “I can always count on him to have my back. If I can’t find the answer, Aaron knows where to look!”
Headshots Eli thegem person

Eli Meier

COO | CTO
Eli is our jack-of-all-trades. His degree is in English, and he intended to teach before he discovered a natural aptitude for computers. He combines the two in his role at Lighthouse, as he has a unique ability to explain complex technology in relatable, understandable conversation. Over more than twenty years working in IT, he’s written e-commerce programs for a university, set up an email cluster for a major league baseball team, and managed/executed hundreds of IT projects. He enjoys classic Volkswagens, cooking and barbeque, and hiking and camping. He and his wife have been married twenty-one years and have nine kids. Though he is 6’1”, he is the SHORTEST male in his entire extended family. We all feel badly for him.
Headshots Ray thegem person

Ray Wilson

Chief Executive Officer
Ray is our CEO and he is passionate about helping businesses – both ours and our clients’ – succeed. Except for Skip, he’s probably been involved with IT longer than anyone – he was troubleshooting computers and repairing them at his school when he was seven! As an intern while attending UMHB, he was involved with IT, but really started growing when he joined our team in 2005. When he transitioned most of our clients to managed services, our MSP business was truly born, and we then grew it from five to forty people between 2006 and 2016. In that time, he was a help desk tech, business processes consultant, account manager, salesperson, sales engineer, client services manager, sales manager, and COO. If you want to get his juices flowing, challenge him to any team sport or ask him to go snow skiing. He’s been married to his high school sweetheart fourteen years and they have three high-energy boys. Oh… and both of his parents are also small business entrepreneurs.

Schedule Your Consultation Now

Just fill our the form below and we'll get right back to you.