- IT Support
- IT Security & Data Protection
- IT Services
- Voice & Cable
- About Us
The most common security threats are unauthorised access, viruses, scams and frauds.
Understanding threats, vulnerable areas, likelihood of threat, potential cost to business, preventative measures, detection tools and recovery action.
Unauthorised Access –
Correctly configured firewall, anti-virus, anti-spyware, email content scanners, regular systems updates with service packs, patches and hot fixes.
Anti-virus and anti-spyware installed on all desktops, laptops and servers – updated on a regular basis.
Staff to treat unknown e-mails and attachments with caution.
Consider a hosted email spam and virus scanning service.
Wireless Technology –
Check all default equipment settings and change where appropriate.
Most security breaches are by users due to the lack of understanding and awareness of basic IT issues.
Carry out general awareness training to all users, and refresher sessions annually, this will also enable you to discuss new technology/procedures’ that have been put into place.
The key to effective IT security is a sound information security policy - a document stating how you plan to protect your IT assets.
You should also consider an Acceptable Use Policy for all those who have access to your systems.
The BCP is to enable your business to restore business critical systems and infrastructure as soon as possible after a disaster scenario.
Investing in IT Security could prevent such disasters, however we always advise our customers to have a BCP so your clients and investors can rest assured that you are one step ahead when it comes to IT Security.
Join our customers already enjoying hassle free IT Support!