How safe is your IT Network?

IT Security Check List

Check you have Anti-Virus

Ask yourself these questions, do you have the same application deployed or an array of different providers? A uniform AV suite is more desirable. Are your AV full copies or are few devices running evaluation versions? How are your AV’s managed? Do you use a central server to deploy and manage your AVs which automatically tracks the health of your machines, as well as push out any required updates, or is this critical work left to Tim in accounts to do…when he gets the time…to research how-to on Google (if I had a pound for every time we have heard this…well you know the rest)

Are Wi-Fi networks encrypted?

For example:

FirstcarCountrySymbolNumberBetween12and63DifferentSymbol

A possible password generated from this standard could be FordItaly&27! — very random but secure.

What Versions of Software Are You using and Are Provisions Made for Software Patching?

Many businesses still run software that is no longer supported by the vendor. This means that critical updates (or patches) necessary to plug any security gaps will no longer be released by them. It is easy to ensure you are running the latest (or at the very least a supported) version of your application by checking out their website. Microsoft’s is here but a quick google search will also provide details for other vendors (try typing support cycle for, then add software name. For Adobe you would type “support cycle for adobe”). If you are still running legacy unsupported software, then chances are your systems will not be secure and hackers will have taken advantage of this.

Making sure you apply the patches for supported software is equally important. Vendors such as Microsoft, will release patches to “close” security gaps once they find them. Microsoft has its monthly Patch Tuesdays when it releases new patches, while Adobe has committed to a quarterly patch schedule for its software. Do you pay attention to the various patch schedules and make provisions for software patching, especially for large or critical updates?

Encrypt Your Mobile Devices

Backup and Disaster Recovery Provision

Equally important is having well documented and regularly tested backup and disaster recovery procedures. What do you do if there was a major security breach? Just like having a fire evacuation process you also need to have procedures that tells your users what they should do if they believe their systems have been breached.

One advice we give our customers and is the number one action in our “Stop and Think” prep guide is for the user to disconnect their device from the network. This simple action could help stem the spread of a virus for example.

Do You Regularly Train Your Users?

There are many free resources on the internet to help you create your own training program — covering the basics is all that is needed. The Government’s National Cyber Security Centre is a good place to start.

Want more advice? If you would like advice on IT for your small business or start-up, get in touch.

Money saving technology advice, news and more from an IT Support Company in Birmingham. #ITSupport #ITConsultancyMidlands #ITSecurity