Processing Your Payment

Please do not leave this page until complete. This can take a few moments.

April 18, 2016 How To

How To: Protect a small business from computer disaster

According to a recent CNN Money article, there are an estimated 1 million malware threats released every day.

Many businesses, however, fail to implement appropriate security for their network and still suffer catastrophic losses.

Consider that:

  • 60% of companies lose their data within six months of a breach;
  • 31% of PC users have lost all of their files due to events beyond their control;
  • 140,000 hard drives crash nationwide every week.

An organization affected by malware, breach, natural disaster or other unexpected downtime may experience lost credibility, falling sales and even low morale. It may force a shut down.

There is no substitute for technology expertise when designing or restructuring business technology, regardless of whether it's an in-house team, a single technician or a fully outsourced partner. There are, however, a number of things that an organization and its leadership can do to prepare for and protect the business.

How to prepare

First, understand the business's mission-critical technology. A company's most important technology may include email, inventory management, manufacturing automation systems and electronic medical records. It doesn't matter what the technology is; it matters that it's identified as critical and is aligned with the company's objectives. Understanding what the hardware or software does and how it impacts a business allows leadership to make informed decisions, which can reduce hardware costs and streamline workflows.

This serves two purposes: to foster a risk management mindset and to identify systems that need additional safeguarding or backup.

For instance, in recent years, application developers have ended support for beloved but out-of-date software, such as Windows XP, leaving many businesses vulnerable to attack or system failure.

Streamlining technology reduces the points of entry or failure in a network. It also makes it easier to keep systems current, updating operating system updates or adding security patches. It also helps the bottom line by reducing unnecessary hardware and software and improving efficiency.

It helps to create a disaster recovery plan. Get creative and imagine the absolute worst that could happen: Fire, flood, data corruption, hardware malfunction, human error or theft.

Create contingency plans for each scenario, with a view to realistic solutions.

How to protect

Education is paramount to keeping a company's network secure. As social engineering attacks like phishing and baiting continue to rise and devices increasingly connect to the Internet of Things, employees are the front-line defense. It is important to ensure that every person in the organization understands the risks of technology to the business and maintains an alert attitude.

Use the 3-2-1 rule. In the case of a true disaster, networks, hardware and of course buildings can be destroyed. Backing up data allows a company to resume operations without having to rebuild everything. Find a backup protocol that creates three copies of the data, stored on two different types of media, with one copy stored offsite.

Adopt a layered security model that incorporates firewalls, web and email filtering as supplements to antivirus and anti-malware. Train staff on social engineering and keep systems current with security patches.

Perhaps the single best protection a company can invest in is the time to find the right IT partner. Every company has a different budget, situation and challenge. Access to the right expertise at the right time, whether in-house or outsourced, can make all the difference.

Taking some basic precautions and envisioning the future can provide a way for organizations of all sizes to thrive, even when faced with technological catastrophe.

Nick Knowlton, virtual chief information officer at SymQuest Group Inc. in Lewiston, can be reached at nknowlton@symquest.com

Sign up for Enews

Comments

Order a PDF