Find out about the latest IT industry news, along with any news and and special offers from Pyramid IT right here on our blog. Pyramid IT have been providing IT support and computer services to businesses in West Lothian, Edinburgh and surrounding areas for several years.
The phrase “island hopping” conjures up positive images. You might
think of cruising beautiful sandy beaches on a tour of tropical islands. Too
bad cybercriminals have given the term a new, less pleasant spin.
Island hopping is an increasingly popular method of attacking
businesses. In this approach, the cybercriminal targets a business indirectly.
The bad actors first go after the target’s smaller strategic partners. So,
vendors or affiliates, who might not have the same level of cybersecurity,
become stepping stones to hop.
Attackers might hack into smaller businesses handling the target’s HR,
payroll, accounting, healthcare, or marketing. Then, they take advantage of the
pre-existing relationship to access the final destination.
Humans are trusting. Cybercriminals exploit that. With island hopping,
attackers leverage the trust established between strategic partners.
It’s quite simple: attackers gain access to Company A and send a
counterfeit business communication to Company B. Company B, knowing the sender,
is less likely to question a download link or opening an attachment.
After all, it’s not coming from a stranger; it’s a message from
perfectly pleasant Jenny at Company A. You may have in the past already shared
logins to various sites/portals, or passwords to unlock zip files.
The Rise of Island Hopping
This is not a brand-new form of attack. In fact, it’s named after a
military strategy which the United States used in World War II to establish a
stronghold in the Pacific Islands.
Perhaps the best-known island-hopping cyberattack was seen in the
United States in 2013. Retail giant Target was the aptly named target of a
point-of-sale system breach. Hackers stole payment information from 40 million
customers. The first “island” in the planned attack was Fazio Mechanical
Services. The heating and refrigeration firm suffered a malware attack shortly
before Target’s breach. Fazio’s hackers stole email credentials needed to
access the retailer’s networks.
As enterprises continue to strengthen their cybersecurity, it’s
predicted that island hopping will gain momentum. According to Accenture’s
Technology Vision 2019 report, less than a third of businesses globally know
how strategic partners secure their networks. A majority (56%) rely on trust
that business partners would uphold security standards.
Preventing Island Hopping
You may be one of the islands to hop or the attackers’ final
destination. It depends on your business size and industry. Either way, your
business is vulnerable to malware attack, infected systems, or a data breach.
Plus, if you’re the stepping stone, you’re likely to lose the target company’s
How do you prevent island hopping? First, secure your own networks and
Follow best practices to detect and identify vulnerabilities
and reduce risk.
Educate your employees about the dangers of business
Raise awareness of phishing schemes and social
Require two-factor user authentication.
Change all default, generic, or predictable passwords.
Keep security up to date (patching and system upgrades
Control who can access your networks and servers.
Protect all endpoints (including employee devices in a
Bring Your Own Device workplace).
When it comes to cyber island hopping, your business doesn’t want to be
a layover or the final destination. Keep your cybersecurity borders tight to
avoid unwanted visitors.
Want to make your business inhospitable to island hoppers? Work with a
managed service provider. They can help assess cybersecurity, provide a plan to
reduce risk, and upgrade technology. Let us support your efforts to fend off
Maybe you started your business in a home office. It was just you at the beginning. Then, your service or product gained traction. The number of staff grew, and you moved into an office. It’s amazing how far you’ve come. Better still, your business continues to grow. It may be time to consider some of these tech tips to help your thriving business.
#1 Upgrade to
Business-Grade Cloud Services
Perhaps you’ve been relying on free software from Gmail, Outlook, or
Dropbox. Who can argue with free email, calendars, collaboration and file
storage right? Well, it may be time to upgrade to the business versions of the
software your team relies upon.
Move from Gmail to Google Apps, or Outlook to Office 365, or Dropbox to
Dropbox Business. For a small monthly fee, you gain business-grade features.
The basic Google Apps offers business email, video and voice
conferencing, secure team messaging, shared calendars, 30GB cloud storage and
document, spreadsheet and presentation creation. Plus, you gain greater
security and administration controls. Right now, a disgruntled employee could
refuse to give up control of a business account.
You’d be out of luck. With Google Apps, your business would control all
accounts and could simply reset the password.
Or Dropbox Business provides added storage space and user activity and
sharing auditing. Unlimited file recovery and version history make recovery
easier. A remote wipe feature protects files on a stolen device).
#2 Revise your backup
A consumer grade backup setup was enough when you were only dealing
with one computer. Now that you have many computers, it’s worth enhancing your
With 3-2-1 backup, your business has a minimum of three backups. Two
would be onsite (but separate from one another) and the other offsite. We
recommend the cloud. Having your backups in a unified location helps efficient
recovery if disaster strikes. With cloud backup, your data is encrypted for
storage in the cloud. You can set parameters for how often data is backed up
and confirm that it is backing up correctly. Then, if something does go wrong,
you can access essential data from anywhere, anytime via the cloud.
#3 Consider Cloud-based
Traditional small business accounting software requires a large
database on the desktop computer. As more people need access to the database,
the problems start. With multiple people accessing the accounting software:
The network can slow when people try to access it remotely
Changes can’t be made while someone else is in database
Data can get mismatched depending on who has the “newest” version
Cloud-based accounting packages address these challenges. With online
accounting software, it’s easy for your business to scale. Business owners can
connect to the data from any device with an Internet connection. Plus, in the
event of a disaster, productivity won’t suffer as the information is safe and
secure on the cloud.
#4 Outsource your IT
Your expanding technology allows you and your staff to do more than
ever before. Great. But it also takes extra resources to monitor, manage, and
secure it all. By outsourcing IT, your business gains IT expertise. Meanwhile,
your in-house IT team can focus its efforts on driving growth.
Outsourcing IT also provides long-term cost savings by reducing
downtime, cutting infrastructure costs, and improving security to avoid costly
Keep your business growth in check with an eye out for value-adding initiatives. Want to know more about the benefits of any of these tech tips? Give us a call on 01506 667990
Like a persistent cough or muscle strain that won’t go away, many IT
issues prove ongoing. Every time they come back you think about getting an
expert’s opinion. Then, the cough fades, you can walk freely again, or your
computers are back up and running. You keep on going. Until the next time. If
you’re sick of ongoing issues with your IT, look to a Managed Service Provider
(MSP) for help.
There are many IT ailments that can negatively impact your ability to
do work. Let’s consider some of the particularly common ones, and why an MSP is
the right prescription.
#1 Network and
Business is done online these days. Not being able to connect to the
network and slow connections are frustrating. Without the Internet, how can you
do your job? You can’t even check and send emails! Let alone access team
documents or enter data into cloud-based accounting software. A lagging network
also slows down application and data loading time. It may only be a few moments
of thumb twiddling. But add that up over several times a day and multiple by
employees. You’re looking at a decrease in productivity that adds up.
An MSP has the know-how to survey the IT environment for what’s causing
these frustrations. When there’s a problem, they’re at the ready to resolve it
and help improve reliability.
#2 Repeated malware
This can mean a couple of things. First, you don’t have effective
system and application protections in place. These attacks shouldn’t be able to
make it through the door in the first place. With the right firewalls,
anti-spam, and protections, you should be able to keep your system on lock
down. You don’t have to do this yourself. Your internal IT team has a lot to
manage and monitor. Gain expert backup with an MSP reviewing your security protocols
to keep the bad guys at bay.
Secondly, educate employees about the dangers of social engineering.
Don’t let them keep falling for the pretexts and downloading malicious files.
Also, ensure passwords are strong enough to avoid adding another point of
#3 Printing problems.
Many businesses are printing less today, but we’re not done with hard
copies entirely. So, when a printer starts whirring, spinning endlessly, or
can’t connect, efficiency halts. Know that printers sold at big box stores are
consumer grade quality. Avoid printer frustrations with solid business-class
printers (which your MSP can identify).
Maybe some of your employees prefer Dropbox. Others rely on their free
Gmail accounts. This hodgepodge of options can cause chaos. Staff have
difficulty remembering the passwords to all of the accounts they need. So, they
simplify, and that makes their accounts more hackable.
Upgrading to business-grade versions of important applications is
easier with an MSP. They’ll help identify the software that best addresses your
#5 Aging technology.
You’ve had your current computers for ages. They are slower than you’d
like, but you don’t have the time to look for something else. Plus, you can’t
imagine having to learn something new. You’re too busy. But aging tech is more
likely to fail, which could prove catastrophic if you don’t have the right
MSPs know IT. Based on your individual business needs, they can suggest
a plan of attack to update the IT and keep it secure. They can also provide
backup strategies to prepare for the worst and recover quickly.
Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field. Gain a competitive advantage with the support of an MSP. Give us a call on 01506 667990
You may have hated group projects in school, but collaboration is a
lifeblood of business. Yet members of a team may not work in the same
workspace. Even those who do, don’t want to spend their day crisscrossing the
office to get quick questions answered. While they could send an email or pick
up the phone, instant messaging is an even more efficient solution.
Don’t confuse this solution with the old AOL or MSN Instant messenger.
Instant messaging (IM) for business takes group communication and collaboration
up a notch.
First, IM is truly instant communication, faster even than email. When
you type in your comment and hit Enter, your message appears on the screen
instantly. You can see it, and everyone else in the chat can see it. While
email is fast, it’s not instant. You must wait for the email to arrive and hope
the recipient has their inbox up and will answer right away.
Calling on the phone could be as instantaneous, but often you’re going
to get voicemail. Don’t even try to get several people on the phone at the same
time without prescheduling a time! With IM, employees can chat in real time as
if they were on the phone with someone or on a conference call. An added bonus?
They can use IM while on the phone too. So, a sales team could have IM
up to relay information, while on the call, to make the best impression with
Users can click and drag files, images, spreadsheets, PDFs, and more
into the chat. For some businesses, IM is a way to keep all team documentation
accessible in a single place.
Common business IM applications, such as Slack or Microsoft Teams,
allow users to coordinate chats for greater efficiency. In group channels
everyone on the channel can see what is going on. So, a business might set up
channels for different client projects or a certain team members. Even clients
can be invited to participate on channels.
IM also allows for direct person-to-person messaging. So, someone in
marketing might shoot over a screenshot for a quick vote on wording or font
Group channels (open or private) and direct messages in the IM app
become a record of what’s been going on over time. They are searchable and have
many integrations with other tools you may be using in your office. For
example, someone could post a link to a Dropbox or Google Docs file and instant
messenger will show a preview.
A possible drawback is that instant messaging can be distracting. Being
“always available” makes it more difficult to focus on the task at hand.
Fortunately, most instant messengers let users change their status to “Away.”
They will still be in the chat, but not available to respond to messages.
Otherwise, the user can simply close the app.
IM’s Other Benefits
Since many instant messengers for business are also phone applications,
employees also gain mobility. After downloading the app, people can access the
system from any Internet-connected device. Talk about real-time communication
Other business benefits of instant messaging? Our email inboxes get
cluttered with messages that steal attention and waste time. The same thing
doesn’t happen in business IM as users are only in channels with other invited
With an IM solution, employees won’t use personal texting, which could have compliance implications. Providing a continuous record of communications, IM channels can also help quality control. Ready to make the move to instant messaging for your business? Let us help you find the best solution for your needs. Give us a call on 01506 667990
Business Continuity Planning what should you be doing? - YouTube
Business downtime can be disastrous. Working with a managed service provider, your business can prepare for the worst. For one, cloud-based backups drive an efficient returning to business as usual. This ebook examines what disasters might happen and all that a business continuity plan can offer.
Good relationships are essential to your business success. Connections
with customers, clients, vendors, suppliers, and service providers impact your
bottom line. Here’s how to develop a strong relationship with your Managed
Service Provider (MSP).
Your MSP manages your IT and protects your end-user systems for a
consistent subscription fee. Businesses partner with MSPs to:
Improve efficiency and flexibility
Enhance security and compliance
Take a proactive approach to system maintenance
Reduce costs and enjoy predictable pricing
Gain access to new technologies
Along with overseeing smooth IT operations, the MSP’s experts can
advise and consult. The following strategies can help you build a good
relationship with your MSP.
Open the Lines of Communication
Transparency in the relationship can make a big difference. With a
deeper knowledge of your needs, the MSP can better plan your technology
solutions. Communicate goals and the direction you want to take your business.
This lets the MSP collaborate to enhance your IT capabilities.
A service provider frees up internal IT staff for strategic planning,
special projects. If those initiatives mean are going to affect your systems
now or in the future, let the MSP know in advance. Being aware of small changes
can help them prevent a much bigger problem down the road. After all, the MSP
team offers deep understanding of your technology and security. Getting their
input can help you see a bigger return on investment from any new IT plans.
Invest the Time Upfront
As with any relationship that will stand up long-term, you’ll need to
invest some time upfront. Taking a “pay and be done with it” approach will
reduce the relationship’s value.
You don’t want a “one size fits all” IT solution from your MSP. To solve
IT problems with a tailored solution, the MSP needs to understand your needs.
They need to survey and access existing technology and understand your IT
This can seem counterintuitive. Why am I spending more time now talking
about IT when the goal is to think about it less? Because this “getting to know
you” phase is critical to a successful setup. Your MSP wants to provide a
superior service. To leverage available tech, they need to know how to setup a
solution that satisfies your needs. The good news is that once it’s up and
running, your time spent managing and monitoring IT is dramatically reduced.
Establish Roles and Responsibilities
Knowing what to expect of the relationship will help too. You’ll want a
clearly defined Service Level Agreement. In setting that up, remember any
relationship is better when you know and play to strengths. In establishing the
MSP partnership parameters, honestly assess in-house IT strengths and
weaknesses. Craft an agreement that lets your people do what they do best, and
gets the MSP team to fill in the gaps. This lets everyone contribute something
of value, which is always a good thing.
Review the Relationship
No, you don’t need to go to couples counseling together. Still, it will
help your relationship with the MSP if you check-in regularly. Someone at your
business should have scheduled updates with the MSP account manager. This is an
opportunity for you both to explore what’s working and what’s not and discuss
Relationships grow and evolve. Laying the groundwork from the outset
for a good relationship with your MSP. You’ll be glad you did. The better the
relationship, the bigger the benefits to your bottom line.
Looking for a new MSP relationship to support your IT needs? Give us a call at 01506 667990.
Businesses are no longer confusing “the cloud” with those puffy white
things in the sky. For many, the cloud is a backbone business tool. Yet, some
worry about storing their data on the Internet using cloud technologies.
Consider these approaches to boost business confidence in cloud data security.
#1 Encrypt Business
The cloud is a lucrative potential target for cybercriminals. Many
enterprises have turned to this technology. In North America nearly 60% of
enterprises now rely on public cloud platforms. That’s a fivefold increase over
five years, according to Forresters’ Cloud Computing 2019 Predictions.
Some cloud service providers will promise to encrypt your data in
transmission. Take this precaution further by encrypting data before it’s sent
to the cloud. Encrypting data turns it into another form of code. Only the
person with the correct password can decrypt it. If you use a modern encryption
standard, it will be extremely challenging for a hacker to break the code.
Plus, encrypting on your end first ensures the cloud storage provider
only stores encrypted data. So, if their storage gets hacked, or one of their
employees goes rogue, they aren’t able to read your business data. That is
unless they have the decryption password. Make sure the password is strong.
Don’t be one of those people still using “password” or “123456789”!
#2 Have a Backup
Many businesses store data on the cloud as a precaution to have
redundancy. Yet, it’s a good idea to have another backup copy offsite too. Just
In some cases, businesses have migrated almost entirely to the cloud.
All their software and files live on the cloud and they have no other copy.
Don’t let this happen to you. We recommend the 3-2-1 backup strategy. This
means, even for cloud-reliant businesses, having 3 copies of your data. One
would be on the cloud. The other two (2) would be on different devices (e.g. on
your local computer and on a backup drive).
#3 Know your
The cloud is a shared technology model. Partner with a cloud service
provider with stringent security. At the same time, don’t count on the cloud
provider to do everything. Clearly identify security roles and
responsibilities. The Cloud Security Alliance reminds us that this can depend
on the cloud model you’re using:
Software as a Service — The provider is largely
responsible for security. After all, the user can only access the applications.
Platform as a Service — The cloud partner secures the
platform. Your business must configure its own security for anything
implemented on the platform. This includes securing the database, managing
account access, and authentication methods.
Infrastructure as a Service — You’re responsible for
everything built on the provider’s infrastructure. They will likely monitor
their perimeter for attacks, but the rest is your job.
Cloud technology offers several advantages:
Enables IT to scale without investing in equipment,
software, employee training, or taking up valuable office footprint
Offers peace of mind that data will always be
available regardless of conditions at a particular business location
Provides up-to-date technology users can access from
any device, anywhere, anytime — as long as they have an Internet connection
The cloud revolution has come. When you join the ranks of those
migrating data to the cloud, do so with these safety suggestions in mind.
Need help securing your data? Whether you’re backing up locally or on the cloud, give us a call at 01506 667990.
We often tend to be creatures of habit, particularly when it comes to technology. Passwords are a prime example. Many of us use the same logins for multiple websites and applications because we don’t have a photographic memory. A large percentage of users aren’t aware that this is one of the most significant security dangers they can face online. It has a simple fix too.
Regularly, in the news today, there are stories about major companies being hacked, their customer data stolen, and their customers left stranded. Hackers commonly use data stolen from one site to access others where login credentials have been reused between accounts. In some cases, access to bank accounts has been gained simply by using a compromised email account.
Businesses and individuals can face significant losses simply because a third party outside their control has been hacked or compromised.
The Danger Of Old Passwords
MySpace is a key example of why old and possibly forgotten services pose a security danger when passwords haven’t been regularly changed. Once a thriving popular network, the use of MySpace services declined drastically from 2007 onwards. While many people moved to new social networks, old accounts typically remained abandoned on their servers. Hundreds of millions of accounts remained on MySpace servers many years past the firm’s peak.
In 2016, MySpace suffered a data leak which exposed usernames, emails, and passwords of 360 million user accounts. Shortly after the hack, these details were published online for anyone to see. Many were used to access email accounts, servers, and accounts that shared the same details.
Even if you have never had a MySpace or social media account personally, how many of your employees or coworkers have one or more? Many have had more social media, forum, or game accounts than they care to remember. Have their passwords been updated since 2016?
Your business network protects your systems, work, and intellectual property. For many firms it’s the single most critical component, the backbone to business operations. Keeping it secure regardless of the number of people, staff or clients using it is a crucial task.
Consider how many people currently have access and how many of those may reuse their password on another website or service. Just reusing your password once can expose you to the hacking of a third party entirely out of your control.
Good security practice is to use a unique and strong password for every login you use. A strong password should include, where possible, capital letters, lowercase letters, numbers, and character symbols. Many consider this impractical or even impossible, but it is entirely achievable for every firm.
It is clearly impossible to manually remember a strong password for each one of the dozens of logins needed today. Few would even attempt to. A password manager makes storing, retrieving, and using unique passwords easy.
When using a password manager, an individual is required to remember only one single strong password to access a database which contains a different login password for each service. This database can be synced between multiple devices, saved and backed up to the cloud, and even used to create strong passwords for you.
Password managers can be used to implement security policies that demand zero password reuse, between services or over time, and set strict limits over the duration a password can last. With the right policies in place, both your business and your employees are protected against attacks from hackers that have compromised third-party sites.
The maximum recommended lifetime of a password for any service is a single year. Make the start of the calendar year the time which you refresh your passwords and start new.
To help keep on top of your security and make sure your firm is safe well into the new year, give us a call at 01506 667990
Around the world, the new year is a time for celebration. It’s a time to reflect and a time we typically resolve to make the most of coming 12 months. We do this by leaving last year’s problems precisely where they belong, in the past year.
Many manage to adopt this approach in their personal lives, but it pays enormous dividends to apply it to our businesses too.
Cleaning up open issues from previous years gives you and your team free reign to make the next year a record-breaking success with nothing to hold you back. Intermittent IT problems, network slowdowns, printing issues, and unavailable resources can all be left in the past.
Starting the year off with a clean IT slate simply leaves you to handle the business areas which you do best.
Set Your Network Straight
If your only relationship with IT last year involved calls to fix broken systems then it is time to have your IT fixed up for good. Break-fix relationships can add stress to both your company and your IT provider.
While getting up and running fast and fixing breaks to get back on track is a clear priority, more can be done to ensure breaks don’t happen and downtime is avoided. Repeated break-fix call outs waste large amounts of time to troubleshoot, diagnose, and patch an unfamiliar system every time it has an issue.
Using IT to set you up right means using knowledge and experience gained over time to right the ship and keep the whole system working together.
The same experience configuring your network top to bottom can be called on again to update or change it as requirements and projects shift. With a complete system picture, less time can be spent on troubleshooting, and more can be allocated to just getting work done.
Sports Car IT
IT with long-standing issues and bugs, ones that staff have gotten accustomed to working around, can be like running an old vehicle. It’s often more expensive to maintain an old car than purchase something more modern requiring less maintenance. An old car requires more parts, becomes less efficient, uses more oil, and is more likely to suffer breakdowns too. The same is true of old IT.
The cost over time of a well-configured system can often be the same or even less than fixing broken issues on the old one. The difference is a dramatic difference in downtime and lost productivity. Better IT means getting where you need to be, faster.
Your Staff Deserve IT
Nothing distracts employees from a task more than unexpected downtime or systems failures. Whether getting crucial documents Friday afternoon, or attempting to settle into work Monday morning; bad IT is frustrating, disheartening, and time-consuming.
One of the hardest but most rewarding elements to cultivate in a company is good staff morale. When you have it, productivity goes up, turnover goes down, and the business environment is vastly improved for everyone. When you don’t have it, the workday is that much tougher for everyone.
Workflow issues are well known to be one of the top contributors to poor morale. Slow machines, unavailable printing, and interruptions cause more knock-on issues than just the IT department can fix. Good employees need and deserve the right tools for the job.
A Better Way to Operate
Use the new year as a golden opportunity for a fresh start on your IT. An assessment of your system by IT professionals will diagnose issues and give you a complete guide to get back on track. Whether caused by a configuration error, bad devices, or something else; we’ll track down the causes and leave them to be forgotten about.
There’s never a better time to establish a managed IT services relationship. Contracting professional services can put an end to system bottlenecks, configure your system right, and advise on the best course to take into the new year.
The most important decision you can take into the year ahead is to stop addressing IT issues as they happen. Take charge of your IT and fix the underlying causes holding you up.
Give us a call today at 01506 667990 to start a service relationship that will see your business take off into a very happy new year.
Make Sure Your Business Doesn’t Suffer the Same Fate
Up to 500 million travellers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014.
The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left customers vulnerable. The exploit exposed critical guest information which included names, addresses, passport numbers, and dates of birth. Marriott also announced an unknown number of customers had encrypted credit card details stolen in the attack.
If you have been a member of Marriott’s Preferred Guest Program or a customer of Marriott hotels in the past, you should take steps today to ensure your data security. By doing so, you can protect your finances, prevent identity theft, and defend your data from attackers looking to exploit an opportunity.
Secure Your Data
Changing your Marriott password should, of course, be the first step to protecting your accounts. Even more importantly, sites, where that same password may have been reused, should be updated with new credentials too. Hackers commonly try details stolen from one site to access popular services and pages. We encourage everyone to use a password manager to store their details for safe use in the future. A good password manager enables unique, random, and strong passwords to be used with ease for every single website.
While we can’t stop hacks on systems outside of our control; we can defend our other accounts from being accessed by criminals.
With secure password management, attacks on your business services or related accounts from a single hack are made impossible.
Performing Damage Control
The damage to the Marriott International brand following news of the leak will be undoubtedly huge. At a minimum, they have lost the trust of their customers worldwide. Asking customers to leave their personal and financial details again to pay for goods and services will be no small feat.
News of the hack made front page news as it broke, further damaging the firm’s reputation among potential future customers too. As a result of a simple security attack, Marriott International will be forced into damage limitation to keep customers returning to the brand. This is why business security matters to us; when done right it’s cheaper by far.
The total cost of this latest attack won’t be known for years to come. The firm is vulnerable to lawsuits worldwide, in some cases liable for financial losses, and required to purchase identity monitoring and security services for affected customers. Business owners can learn from Marriott’s costly lesson.
Stopping an Attack in its Tracks
Marriott’s security breach was recently discovered, hitting the headlines just this week, but the firm admitted unauthorized access took place since 2014. This means the firm had a security hole for four years that they were unable to detect or patch.
For a firm of any size, this should be unacceptable. As business owners, we shouldn’t accept security vulnerabilities that leave our records, finances, or services open to hackers. As customers, we shouldn’t accept our data being treated so carelessly. The recent Marriott hack underlines the need for businesses to maintain constant network monitoring, regular security updates, and a lockdown on data access.
Protect Your Business and your Customers – Any business can find their systems vulnerable to attack at some point. Whether waiting for updates, a newly released zero-day hack, or malicious employee; responsible firms take steps to limit their liability.
As a rule, staff accounts should be locked to only the systems the regularly need to access. Similarly, customer data should only be open on an as-needed basis when a legitimate requirement exists. These steps, alongside systems and data monitoring, prevent a small-scale attack resulting in an enormous data breach. Strong security enables customers to place and maintain their trust in a brand they can keep coming back to again and again.
If your business could use a security update to protect against a Marriott style attack in the future, give us a call today at 01506 667 990