Loading...

Follow Pyramid IT - IT Support Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

The phrase “island hopping” conjures up positive images. You might think of cruising beautiful sandy beaches on a tour of tropical islands. Too bad cybercriminals have given the term a new, less pleasant spin.

Island hopping is an increasingly popular method of attacking businesses. In this approach, the cybercriminal targets a business indirectly. The bad actors first go after the target’s smaller strategic partners. So, vendors or affiliates, who might not have the same level of cybersecurity, become stepping stones to hop.

Attackers might hack into smaller businesses handling the target’s HR, payroll, accounting, healthcare, or marketing. Then, they take advantage of the pre-existing relationship to access the final destination.

Humans are trusting. Cybercriminals exploit that. With island hopping, attackers leverage the trust established between strategic partners.

It’s quite simple: attackers gain access to Company A and send a counterfeit business communication to Company B. Company B, knowing the sender, is less likely to question a download link or opening an attachment.

After all, it’s not coming from a stranger; it’s a message from perfectly pleasant Jenny at Company A. You may have in the past already shared logins to various sites/portals, or passwords to unlock zip files.

The Rise of Island Hopping

This is not a brand-new form of attack. In fact, it’s named after a military strategy which the United States used in World War II to establish a stronghold in the Pacific Islands.

Perhaps the best-known island-hopping cyberattack was seen in the United States in 2013. Retail giant Target was the aptly named target of a point-of-sale system breach. Hackers stole payment information from 40 million customers. The first “island” in the planned attack was Fazio Mechanical Services. The heating and refrigeration firm suffered a malware attack shortly before Target’s breach. Fazio’s hackers stole email credentials needed to access the retailer’s networks.

As enterprises continue to strengthen their cybersecurity, it’s predicted that island hopping will gain momentum. According to Accenture’s Technology Vision 2019 report, less than a third of businesses globally know how strategic partners secure their networks. A majority (56%) rely on trust that business partners would uphold security standards.

Preventing Island Hopping

You may be one of the islands to hop or the attackers’ final destination. It depends on your business size and industry. Either way, your business is vulnerable to malware attack, infected systems, or a data breach. Plus, if you’re the stepping stone, you’re likely to lose the target company’s business, too.

How do you prevent island hopping? First, secure your own networks and systems:

  • Follow best practices to detect and identify vulnerabilities and reduce risk.
  • Educate your employees about the dangers of business communication scams.
  • Raise awareness of phishing schemes and social engineering.
  • Require two-factor user authentication.
  • Change all default, generic, or predictable passwords.
  • Keep security up to date (patching and system upgrades are mandatory).
  • Control who can access your networks and servers.
  • Protect all endpoints (including employee devices in a Bring Your Own Device workplace).

When it comes to cyber island hopping, your business doesn’t want to be a layover or the final destination. Keep your cybersecurity borders tight to avoid unwanted visitors.

Want to make your business inhospitable to island hoppers? Work with a managed service provider. They can help assess cybersecurity, provide a plan to reduce risk, and upgrade technology. Let us support your efforts to fend off unwanted tourists.

Give us a call on 01506 667990.

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Maybe you started your business in a home office. It was just you at the beginning. Then, your service or product gained traction. The number of staff grew, and you moved into an office. It’s amazing how far you’ve come. Better still, your business continues to grow. It may be time to consider some of these tech tips to help your thriving business.

#1 Upgrade to Business-Grade Cloud Services

Perhaps you’ve been relying on free software from Gmail, Outlook, or Dropbox. Who can argue with free email, calendars, collaboration and file storage right? Well, it may be time to upgrade to the business versions of the software your team relies upon.

Move from Gmail to Google Apps, or Outlook to Office 365, or Dropbox to Dropbox Business. For a small monthly fee, you gain business-grade features.

The basic Google Apps offers business email, video and voice conferencing, secure team messaging, shared calendars, 30GB cloud storage and document, spreadsheet and presentation creation. Plus, you gain greater security and administration controls. Right now, a disgruntled employee could refuse to give up control of a business account.

You’d be out of luck. With Google Apps, your business would control all accounts and could simply reset the password.

Or Dropbox Business provides added storage space and user activity and sharing auditing. Unlimited file recovery and version history make recovery easier. A remote wipe feature protects files on a stolen device). 

#2 Revise your backup strategy

A consumer grade backup setup was enough when you were only dealing with one computer. Now that you have many computers, it’s worth enhancing your backup strategy.

With 3-2-1 backup, your business has a minimum of three backups. Two would be onsite (but separate from one another) and the other offsite. We recommend the cloud. Having your backups in a unified location helps efficient recovery if disaster strikes. With cloud backup, your data is encrypted for storage in the cloud. You can set parameters for how often data is backed up and confirm that it is backing up correctly. Then, if something does go wrong, you can access essential data from anywhere, anytime via the cloud.

#3 Consider Cloud-based Accounting Services

Traditional small business accounting software requires a large database on the desktop computer. As more people need access to the database, the problems start. With multiple people accessing the accounting software:

  • The network can slow when people try to access it remotely
  • Changes can’t be made while someone else is in database
  • Data can get mismatched depending on who has the “newest” version

Cloud-based accounting packages address these challenges. With online accounting software, it’s easy for your business to scale. Business owners can connect to the data from any device with an Internet connection. Plus, in the event of a disaster, productivity won’t suffer as the information is safe and secure on the cloud.

#4 Outsource your IT

Your expanding technology allows you and your staff to do more than ever before. Great. But it also takes extra resources to monitor, manage, and secure it all. By outsourcing IT, your business gains IT expertise. Meanwhile, your in-house IT team can focus its efforts on driving growth.

Outsourcing IT also provides long-term cost savings by reducing downtime, cutting infrastructure costs, and improving security to avoid costly cyber-attacks.

Keep your business growth in check with an eye out for value-adding initiatives. Want to know more about the benefits of any of these tech tips? Give us a call on 01506 667990

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help.

There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.

#1 Network and Internet issues.

Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up.

An MSP has the know-how to survey the IT environment for what’s causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability.

#2 Repeated malware infections.

This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay.

Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry. 

#3 Printing problems.

Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify).

#4 Application overload.

Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable. 

Upgrading to business-grade versions of important applications is easier with an MSP. They’ll help identify the software that best addresses your business needs.

#5 Aging technology.

You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup.

MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly.

Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field. Gain a competitive advantage with the support of an MSP. Give us a call on 01506 667990

Computer support in West Lothian and Edinburgh

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

You may have hated group projects in school, but collaboration is a lifeblood of business. Yet members of a team may not work in the same workspace. Even those who do, don’t want to spend their day crisscrossing the office to get quick questions answered. While they could send an email or pick up the phone, instant messaging is an even more efficient solution.

Don’t confuse this solution with the old AOL or MSN Instant messenger. Instant messaging (IM) for business takes group communication and collaboration up a notch. 

First, IM is truly instant communication, faster even than email. When you type in your comment and hit Enter, your message appears on the screen instantly. You can see it, and everyone else in the chat can see it. While email is fast, it’s not instant. You must wait for the email to arrive and hope the recipient has their inbox up and will answer right away. 

Calling on the phone could be as instantaneous, but often you’re going to get voicemail. Don’t even try to get several people on the phone at the same time without prescheduling a time! With IM, employees can chat in real time as if they were on the phone with someone or on a conference call. An added bonus?

They can use IM while on the phone too. So, a sales team could have IM up to relay information, while on the call, to make the best impression with the client.

Users can click and drag files, images, spreadsheets, PDFs, and more into the chat. For some businesses, IM is a way to keep all team documentation accessible in a single place.

IM Improves Productivity

Common business IM applications, such as Slack or Microsoft Teams, allow users to coordinate chats for greater efficiency. In group channels everyone on the channel can see what is going on. So, a business might set up channels for different client projects or a certain team members. Even clients can be invited to participate on channels. 

IM also allows for direct person-to-person messaging. So, someone in marketing might shoot over a screenshot for a quick vote on wording or font size.

Group channels (open or private) and direct messages in the IM app become a record of what’s been going on over time. They are searchable and have many integrations with other tools you may be using in your office. For example, someone could post a link to a Dropbox or Google Docs file and instant messenger will show a preview.

A possible drawback is that instant messaging can be distracting. Being “always available” makes it more difficult to focus on the task at hand. Fortunately, most instant messengers let users change their status to “Away.” They will still be in the chat, but not available to respond to messages. Otherwise, the user can simply close the app.

IM’s Other Benefits

Since many instant messengers for business are also phone applications, employees also gain mobility. After downloading the app, people can access the system from any Internet-connected device. Talk about real-time communication and collaboration. 

Other business benefits of instant messaging? Our email inboxes get cluttered with messages that steal attention and waste time. The same thing doesn’t happen in business IM as users are only in channels with other invited parties.

With an IM solution, employees won’t use personal texting, which could have compliance implications. Providing a continuous record of communications, IM channels can also help quality control. Ready to make the move to instant messaging for your business? Let us help you find the best solution for your needs. Give us a call on 01506 667990

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Business Continuity Planning what should you be doing? - YouTube

Business downtime can be disastrous. Working with a managed service provider, your business can prepare for the worst. For one, cloud-based backups drive an efficient returning to business as usual. This ebook examines what disasters might happen and all that a business continuity plan can offer.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Good relationships are essential to your business success. Connections with customers, clients, vendors, suppliers, and service providers impact your bottom line. Here’s how to develop a strong relationship with your Managed Service Provider (MSP).

Your MSP manages your IT and protects your end-user systems for a consistent subscription fee. Businesses partner with MSPs to:

  • Improve efficiency and flexibility
  • Enhance security and compliance
  • Take a proactive approach to system maintenance 
  • Reduce costs and enjoy predictable pricing
  • Gain access to new technologies

Along with overseeing smooth IT operations, the MSP’s experts can advise and consult. The following strategies can help you build a good relationship with your MSP.

Open the Lines of Communication

Transparency in the relationship can make a big difference. With a deeper knowledge of your needs, the MSP can better plan your technology solutions. Communicate goals and the direction you want to take your business. This lets the MSP collaborate to enhance your IT capabilities.

A service provider frees up internal IT staff for strategic planning, special projects. If those initiatives mean are going to affect your systems now or in the future, let the MSP know in advance. Being aware of small changes can help them prevent a much bigger problem down the road. After all, the MSP team offers deep understanding of your technology and security. Getting their input can help you see a bigger return on investment from any new IT plans.

Invest the Time Upfront

As with any relationship that will stand up long-term, you’ll need to invest some time upfront. Taking a “pay and be done with it” approach will reduce the relationship’s value. 

You don’t want a “one size fits all” IT solution from your MSP. To solve IT problems with a tailored solution, the MSP needs to understand your needs. They need to survey and access existing technology and understand your IT strategy.  

This can seem counterintuitive. Why am I spending more time now talking about IT when the goal is to think about it less? Because this “getting to know you” phase is critical to a successful setup. Your MSP wants to provide a superior service. To leverage available tech, they need to know how to setup a solution that satisfies your needs. The good news is that once it’s up and running, your time spent managing and monitoring IT is dramatically reduced.

Establish Roles and Responsibilities

Knowing what to expect of the relationship will help too. You’ll want a clearly defined Service Level Agreement. In setting that up, remember any relationship is better when you know and play to strengths. In establishing the MSP partnership parameters, honestly assess in-house IT strengths and weaknesses. Craft an agreement that lets your people do what they do best, and gets the MSP team to fill in the gaps. This lets everyone contribute something of value, which is always a good thing.

Review the Relationship

No, you don’t need to go to couples counseling together. Still, it will help your relationship with the MSP if you check-in regularly. Someone at your business should have scheduled updates with the MSP account manager. This is an opportunity for you both to explore what’s working and what’s not and discuss future plans.  

Relationships grow and evolve. Laying the groundwork from the outset for a good relationship with your MSP. You’ll be glad you did. The better the relationship, the bigger the benefits to your bottom line.

Looking for a new MSP relationship to support your IT needs? Give us a call at 01506 667990. 

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Businesses are no longer confusing “the cloud” with those puffy white things in the sky. For many, the cloud is a backbone business tool. Yet, some worry about storing their data on the Internet using cloud technologies. Consider these approaches to boost business confidence in cloud data security.

#1 Encrypt Business Data

The cloud is a lucrative potential target for cybercriminals. Many enterprises have turned to this technology. In North America nearly 60% of enterprises now rely on public cloud platforms. That’s a fivefold increase over five years, according to Forresters’ Cloud Computing 2019 Predictions.

Some cloud service providers will promise to encrypt your data in transmission. Take this precaution further by encrypting data before it’s sent to the cloud. Encrypting data turns it into another form of code. Only the person with the correct password can decrypt it. If you use a modern encryption standard, it will be extremely challenging for a hacker to break the code.

Plus, encrypting on your end first ensures the cloud storage provider only stores encrypted data. So, if their storage gets hacked, or one of their employees goes rogue, they aren’t able to read your business data. That is unless they have the decryption password. Make sure the password is strong. Don’t be one of those people still using “password” or “123456789”!

#2 Have a Backup

Many businesses store data on the cloud as a precaution to have redundancy. Yet, it’s a good idea to have another backup copy offsite too. Just in case.

In some cases, businesses have migrated almost entirely to the cloud. All their software and files live on the cloud and they have no other copy. Don’t let this happen to you. We recommend the 3-2-1 backup strategy. This means, even for cloud-reliant businesses, having 3 copies of your data. One would be on the cloud. The other two (2) would be on different devices (e.g. on your local computer and on a backup drive).

#3 Know your Responsibilities

The cloud is a shared technology model. Partner with a cloud service provider with stringent security. At the same time, don’t count on the cloud provider to do everything. Clearly identify security roles and responsibilities. The Cloud Security Alliance reminds us that this can depend on the cloud model you’re using:

  • Software as a Service — The provider is largely responsible for security. After all, the user can only access the applications.
  • Platform as a Service — The cloud partner secures the platform. Your business must configure its own security for anything implemented on the platform. This includes securing the database, managing account access, and authentication methods.
  • Infrastructure as a Service — You’re responsible for everything built on the provider’s infrastructure. They will likely monitor their perimeter for attacks, but the rest is your job.

Cloud technology offers several advantages: 

  • Enables IT to scale without investing in equipment, software, employee training, or taking up valuable office footprint
  • Offers peace of mind that data will always be available regardless of conditions at a particular business location
  • Provides up-to-date technology users can access from any device, anywhere, anytime — as long as they have an Internet connection

The cloud revolution has come. When you join the ranks of those migrating data to the cloud, do so with these safety suggestions in mind.

Need help securing your data? Whether you’re backing up locally or on the cloud, give us a call at 01506 667990.

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

We often tend to be creatures of habit, particularly when it comes to technology.  Passwords are a prime example.  Many of us use the same logins for multiple websites and applications because we don’t have a photographic memory.  A large percentage of users aren’t aware that this is one of the most significant security dangers they can face online.  It has a simple fix too.

Regularly, in the news today, there are stories about major companies being hacked, their customer data stolen, and their customers left stranded.  Hackers commonly use data stolen from one site to access others where login credentials have been reused between accounts.  In some cases, access to bank accounts has been gained simply by using a compromised email account.

Businesses and individuals can face significant losses simply because a third party outside their control has been hacked or compromised.

The Danger Of Old Passwords

MySpace is a key example of why old and possibly forgotten services pose a security danger when passwords haven’t been regularly changed.  Once a thriving popular network, the use of MySpace services declined drastically from 2007 onwards.  While many people moved to new social networks, old accounts typically remained abandoned on their servers.  Hundreds of millions of accounts remained on MySpace servers many years past the firm’s peak.

In 2016, MySpace suffered a data leak which exposed usernames, emails, and passwords of 360 million user accounts.  Shortly after the hack, these details were published online for anyone to see.  Many were used to access email accounts, servers, and accounts that shared the same details.

Shared Responsibility

Even if you have never had a MySpace or social media account personally, how many of your employees or coworkers have one or more?  Many have had more social media, forum, or game accounts than they care to remember.  Have their passwords been updated since 2016?

Your business network protects your systems, work, and intellectual property.  For many firms it’s the single most critical component, the backbone to business operations.  Keeping it secure regardless of the number of people, staff or clients using it is a crucial task.

Consider how many people currently have access and how many of those may reuse their password on another website or service.  Just reusing your password once can expose you to the hacking of a third party entirely out of your control.

Password Management

Good security practice is to use a unique and strong password for every login you use.  A strong password should include, where possible, capital letters, lowercase letters, numbers, and character symbols.  Many consider this impractical or even impossible, but it is entirely achievable for every firm.

It is clearly impossible to manually remember a strong password for each one of the dozens of logins needed today.  Few would even attempt to.  A password manager makes storing, retrieving, and using unique passwords easy.

When using a password manager, an individual is required to remember only one single strong password to access a database which contains a different login password for each service.  This database can be synced between multiple devices, saved and backed up to the cloud, and even used to create strong passwords for you.

Strong Protection

Password managers can be used to implement security policies that demand zero password reuse, between services or over time, and set strict limits over the duration a password can last.  With the right policies in place, both your business and your employees are protected against attacks from hackers that have compromised third-party sites.

The maximum recommended lifetime of a password for any service is a single year.  Make the start of the calendar year the time which you refresh your passwords and start new.

To help keep on top of your security and make sure your firm is safe well into the new year, give us a call at 01506 667990

Business IT Support in West Lothian

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Around the world, the new year is a time for celebration. It’s a time to reflect and a time we typically resolve to make the most of coming 12 months. We do this by leaving last year’s problems precisely where they belong, in the past year.

Many manage to adopt this approach in their personal lives, but it pays enormous dividends to apply it to our businesses too.

Cleaning up open issues from previous years gives you and your team free reign to make the next year a record-breaking success with nothing to hold you back. Intermittent IT problems, network slowdowns, printing issues, and unavailable resources can all be left in the past.

Starting the year off with a clean IT slate simply leaves you to handle the business areas which you do best.

Set Your Network Straight

If your only relationship with IT last year involved calls to fix broken systems then it is time to have your IT fixed up for good. Break-fix relationships can add stress to both your company and your IT provider.

While getting up and running fast and fixing breaks to get back on track is a clear priority, more can be done to ensure breaks don’t happen and downtime is avoided. Repeated break-fix call outs waste large amounts of time to troubleshoot, diagnose, and patch an unfamiliar system every time it has an issue.

Using IT to set you up right means using knowledge and experience gained over time to right the ship and keep the whole system working together.

The same experience configuring your network top to bottom can be called on again to update or change it as requirements and projects shift. With a complete system picture, less time can be spent on troubleshooting, and more can be allocated to just getting work done.

Sports Car IT

IT with long-standing issues and bugs, ones that staff have gotten accustomed to working around, can be like running an old vehicle. It’s often more expensive to maintain an old car than purchase something more modern requiring less maintenance. An old car requires more parts, becomes less efficient, uses more oil, and is more likely to suffer breakdowns too. The same is true of old IT.

The cost over time of a well-configured system can often be the same or even less than fixing broken issues on the old one. The difference is a dramatic difference in downtime and lost productivity. Better IT means getting where you need to be, faster.

Your Staff Deserve IT

Nothing distracts employees from a task more than unexpected downtime or systems failures. Whether getting crucial documents Friday afternoon, or attempting to settle into work Monday morning; bad IT is frustrating, disheartening, and time-consuming.

One of the hardest but most rewarding elements to cultivate in a company is good staff morale. When you have it, productivity goes up, turnover goes down, and the business environment is vastly improved for everyone. When you don’t have it, the workday is that much tougher for everyone.

Workflow issues are well known to be one of the top contributors to poor morale. Slow machines, unavailable printing, and interruptions cause more knock-on issues than just the IT department can fix. Good employees need and deserve the right tools for the job.

A Better Way to Operate

Use the new year as a golden opportunity for a fresh start on your IT. An assessment of your system by IT professionals will diagnose issues and give you a complete guide to get back on track. Whether caused by a configuration error, bad devices, or something else; we’ll track down the causes and leave them to be forgotten about.

There’s never a better time to establish a managed IT services relationship. Contracting professional services can put an end to system bottlenecks, configure your system right, and advise on the best course to take into the new year.

The most important decision you can take into the year ahead is to stop addressing IT issues as they happen. Take charge of your IT and fix the underlying causes holding you up.

Give us a call today at 01506 667990 to start a service relationship that will see your business take off into a very happy new year.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Make Sure Your Business Doesn’t Suffer the Same Fate

Up to 500 million travellers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014.

The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left customers vulnerable. The exploit exposed critical guest information which included names, addresses, passport numbers, and dates of birth. Marriott also announced an unknown number of customers had encrypted credit card details stolen in the attack.

If you have been a member of Marriott’s Preferred Guest Program or a customer of Marriott hotels in the past, you should take steps today to ensure your data security. By doing so, you can protect your finances, prevent identity theft, and defend your data from attackers looking to exploit an opportunity.

Secure Your Data

Changing your Marriott password should, of course, be the first step to protecting your accounts. Even more importantly, sites, where that same password may have been reused, should be updated with new credentials too. Hackers commonly try details stolen from one site to access popular services and pages. We encourage everyone to use a password manager to store their details for safe use in the future. A good password manager enables unique, random, and strong passwords to be used with ease for every single website.

While we can’t stop hacks on systems outside of our control; we can defend our other accounts from being accessed by criminals.

With secure password management, attacks on your business services or related accounts from a single hack are made impossible.

Performing Damage Control

The damage to the Marriott International brand following news of the leak will be undoubtedly huge. At a minimum, they have lost the trust of their customers worldwide. Asking customers to leave their personal and financial details again to pay for goods and services will be no small feat.

News of the hack made front page news as it broke, further damaging the firm’s reputation among potential future customers too. As a result of a simple security attack, Marriott International will be forced into damage limitation to keep customers returning to the brand. This is why business security matters to us; when done right it’s cheaper by far.

The total cost of this latest attack won’t be known for years to come. The firm is vulnerable to lawsuits worldwide, in some cases liable for financial losses, and required to purchase identity monitoring and security services for affected customers. Business owners can learn from Marriott’s costly lesson.

Stopping an Attack in its Tracks

Marriott’s security breach was recently discovered, hitting the headlines just this week, but the firm admitted unauthorized access took place since 2014. This means the firm had a security hole for four years that they were unable to detect or patch.

For a firm of any size, this should be unacceptable. As business owners, we shouldn’t accept security vulnerabilities that leave our records, finances, or services open to hackers. As customers, we shouldn’t accept our data being treated so carelessly. The recent Marriott hack underlines the need for businesses to maintain constant network monitoring, regular security updates, and a lockdown on data access.

Protect Your Business and your Customers – Any business can find their systems vulnerable to attack at some point. Whether waiting for updates, a newly released zero-day hack, or malicious employee; responsible firms take steps to limit their liability.

As a rule, staff accounts should be locked to only the systems the regularly need to access. Similarly, customer data should only be open on an as-needed basis when a legitimate requirement exists. These steps, alongside systems and data monitoring, prevent a small-scale attack resulting in an enormous data breach. Strong security enables customers to place and maintain their trust in a brand they can keep coming back to again and again.

If your business could use a security update to protect against a Marriott style attack in the future, give us a call today at 01506 667 990

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview