7 ways to secure small business IT • Blisstech Solutions

It is hard enough running a business without having to worry about how to ensure your computer systems and data are secure from bad guys.  To help you out, we have put together a list of the top 7 things that you should do to secure your small business IT systems.

1. Educate Your Users

Your employees are the first and last line of defence when it comes to securing your small businesses IT.  They are the ones who will click on suspicious links, or download dodgy software from the internet, unless they are properly educated.  Threats from phishing and other scams are at an all-time high, with hackers trying to take advantage of people’s fears, curiosity or greed.
Employees need to be educated now more than ever. Protection for the human layer comes down to training and education. Following the training, you need to keep users on their toes. There are services available that can automate this, such as phishing simulators which will send pretend phishing emails to your users and inform you who clicked on them so you can target additional training.

2. Enable Multi-Factor Authentication

Multi-Factor Authentication (MFA, but also known as 2FA) is a very effective way to secure your small business IT.  It works by adding an additional ‘factor’ to the login, in addition to the password. This ‘factor’ is usually something that you have, such as a mobile phone, email address, or security token that provides and an extra code needed to log in. You may be familiar with using this as it has become very popular recently, being used by banks, the UK Government website and many more. You should turn on MFA to any critical system exposed to the internet. This includes, but is not limited to, VPN, email, CRM, accounting system, and any other cloud-based system used to run your business.  If you use a solution like Microsoft Intune, you can mandate that MFA be required as a condition to accessing any corporate resources with a personal device.

3. Update Your Systems

Having endpoint software up to date is key to ensuring that they are protected from known vulnerabilities and malware. Having a strategy and systems in place to check and enforce encryption policies, anti-virus, Windows and other software updates means you know that your users’ endpoints are up-to-date and protected as much as possible.

4. Use a modern antivirus system

Free antivirus solutions cannot offer you the protection that paid-for solutions can offer.  When you pay for an antivirus solution you get additional features such as Artificial Intelligence that can detect unknown viruses based on the behaviour or characteristics of a file. Enterprise antivirus solutions include centralised management consoles that allow you, or your support provider, to quickly get an overview of the security posture of your organisation. The best solutions will also include the ability to track the execution of malware and see what it actually tried to do; which files it touched and if it attempted to infect other computers on your network.

5. Encrypt your hard disk

Encrypting your hard disks is especially important if you hold any sensitive or personally identifiable information on your systems. Without disk encryption, the files on your computer can be read very easily should the system fall into the wrong hands. Windows 10 Pro and Mac OSX include disk encryption free of charge. This can be centrally managed by your IT service provider if they have the right tools. This ensures that all of your system’s hard disks are encrypted, and that the recovery keys for those discs are centrally managed in case the decryption key or password is lost.

6. Install a unified threat management firewall (UTM)

The broadband router that you get with your Internet service provider comes with a very basic firewall. However, this provides only very basic protection for the systems on your business network.  A UTM firewall includes several layers of security solutions that help to protect your network.  These include an enterprise-class firewall, intrusion prevention system, network antivirus, denial of service protection, and web and email protection. The best solutions will integrate with your enterprise antivirus solution, working together to intelligently protect your systems from threats.

7. Deploy a VPN

A VPN enables employees to make a secure connection into your internal network from anywhere. The connection is encrypted between the remote computer and network so it can safely be used without fear of snooping. For the employee, it can appear to them as if they were connected directly to the internal business network. You should consider adding multi-factor authentication to ensure that, if a user’s password is compromised, the connection is still protected.

We can help

If you need any assistance with remote working, or remote working more securely, please call us on 01299 382 321 or get in touch through the website.

More Content

Windows Hello gets a new look and improved security

Windows Hello gets improvments in security usability

Is your business using Windows Hello yet? It offers easier and more secure login methods – and it’s about to get an upgrade. Here’s what’s changing.

Searching in Windows 11 is about to get easier… for some

Searching in Windows 11 is about to get easier… for some

Searching for files in Windows isn’t always a smooth experience. Sometimes it’s slow and often it’ll show you web results rather than the file you need. But Microsoft is making things much simpler… for some people. Here’s how you can benefit from this.

Charging in public places? Watch out for “juice jacking”

Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More

A woman looking at her phone while working from home

Homeworking is bad for IT security

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture. It has uncovered several...
Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for to stop your business’s data (and profits) falling into the wrong hands…

Tech Tip: How to add a FROM address in Outlook NEW

Welcome to a new Tuesday tech tip video. In it, I will show you how to add a FROM address (or alias) in the new version of Outlook. Microsoft's new version of Outlook, imaginatively titled Outlook New, is very different in look and feel from the Outlook we've all...

Outsourcing always beats DIY

Do you ever feel like you're juggling ten tasks at once to keep your business running? Marketing, sales, finances, IT… the list goes on! And somewhere in that chaos, your dreams for growth get lost. Enter Dave, a fellow entrepreneur who has created the same...
How many devices do you use every workday?

Gadget overload? How many devices do you use at work?

Are all the devices your team uses helping them stay productive – or hindering them? Every extra gadget means another thing to remember, charge, and carry. There’s a simple way to help streamline tech in your business…

When did you last have a health check?

Book now for an IT check-up, to get in great shape for the journey ahead? You do it for yourself and your car – now do the same for your workplace tech

How to get the most from Microsoft Teams

Is your business struggling with too many emails, lost files, and “final_final_v3” documents? Teams could be a game changer. Yep, it does more than just video calls.  For example, you can also: Chat with your employees Host webinars Share and edit files together Keep...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05