Menu 

Part 1: Streamlining Technology Security for SMB

Part 1: Streamlining Technology Security for SMB

By Shea McHugh -Information Security Analyst- Intrinium  

Streamlining Technology Security for SMB – Part 1

Security for small and medium businesses is no longer an optional investment.  With the increasing number of businesses who have experienced loss of revenue and information due to malware, ransomware and phishing emails, it is critical to have a security plan in place to prevent devastating infiltration.

Whether a business takes on the work of establishing a security team in-house or outsourcing the work, establishing a security plan can save time, energy, reputation, and money,   if a breach occurs.  Today, we’re going to discuss the options for security plans and how streamlining this process can help alleviate the worry of what could happen if a breach occurs.

There are various options for businesses looking to establish a plan. However, before developing your plan, there are critical questions that you will need to address to ensure your business can strategize the best approach for a plan.

  • Do you need to maintain Compliance, such as HIPAA or PCI?
  • Do you currently have anti-malware and anti-virus running in your environment?
  • Do you know what kind of information is currently housed on your servers?
  • Do you know who has access to privileged information in your environment?
  • Do you have password complexity requirements in place?
  • Do you have any procedures in place for lost assets, particularly phones or laptops with business information?

If you could easily answer these questions, it is a good sign that you most likely have protocol and procedures in place to properly secure your infrastructure.  Knowing your security plan makes it much easier to identify the areas that need further development.  These security plans are not one size fits all for every company – each company will have their own needs and requirements based on business needs, software requirements, and user population.  These security plans can be created with internal IT and security staff, or external consultants can be brought in to help bring companies up to compliance standards and setup security plans.  If you are looking for guidance on how to get started, give Intrinium a call and speak with a member of our staff about how we can help you get started.

In the following weeks, we will discuss how compliance scans and constant monitoring compare and why each may be necessary in your environment.  After that we will discuss how to pick a security team and what to look out for when choosing security staff to run your scans or monitoring.

 

Submit a Comment

Pin It on Pinterest

Share This