Customers, regardless of size or vertical industry, continuously tell us that security remains a top concern. It’s easy to see why when the news is filled with data breach stories regarding Kmart, Target, Dropbox, NATO, JP Morgan Chase, the Montana Department of Public Health and Human Services and St. Joseph Health System (just to name a few).
No business or organization is immune. Cyber security has become such a big concern that the Department of Homeland Security has declared October National Cyber Security Awareness Month.
According to a July 2014 article in Forbes, Small- to medium-sized businesses are key prey for hackers. In 2013, SMBs collectively made up more than half of all targeted attacks at 61 percent – up from 50 percent in 2012. Worse, half of those companies attacked were unaware.
Often times, SMBs don’t have the internal resources or expertise to safeguard their networks and data. Effectively managing a business’s security can be a daunting task that requires ongoing management, email protection, website security, virus definitions, software and server patches, backup and recovery. It’s a full-time job, and many SMBs that we talk to just don’t have the manpower to dedicate to this important task.
Start with Security Assessments
We recommend that any company worried about IT security start with an IT Security Assessment. Whether you conduct your own assessment or use a third-party IT service provider such as All Covered, Konica Minolta’s IT Services division, assessments should focus on your network, email, devices (workstations, laptops, mobile devices, etc.), data backup, and business continuity plans.
A simple, yet highly effective place to start is by conducting vulnerability scans that test, identify, analyze and report potential security issues on your network. An external scan will mimic how hackers can gain access. An internal scan is run to demonstrate the path a hacker can take once he has gained access to the network and exactly how much data he could collect.
Vulnerability scanning is a non-destructive form of testing that offers immediate feedback on the health and security of your network. Based on that information, your organization can take direct action to better protect your network and the information housed within it.
For a complete Security Assessment, vulnerability scans should be accompanied with discussions on mobile device or “bring your own device” (BYOD) policies, data backup strategies, compliance requirements and contingency planning.
Don’t Go It Alone
Don’t let your security fears keep you up at night. If you don’t have the resources to manage security, leverage an IT services provider who has in-depth knowledge and experience building and executing on effective security plans.
Konica Minolta, through its All Covered division, offers comprehensive IT security services that start with a detailed Security Assessment. All Covered’s Managed Vulnerability Scan automatically scans your external or internal network on a monthly basis for new vulnerabilities and provides access to detailed reports and remediation recommendations. With All Covered, you have access to security experts who will help you implement and manage IT security for ongoing business protection. Expanded Security Services include email and encryption; anti-virus and malware protection; DNS or web content filtering; automatic software, server and desktop patching; backup and recovery solutions; and business continuity planning.
For more information and tips on building an effective security strategy, download our free eBook, Four Keys to Protecting Your Business.