The Business Bulletin Issue #3 - Focus On Operations & Resources

Page 8

The Business Bulletin

The basics of IT security Let’s start off with an uncomfortable truth. The bottom line is that your IT systems are vulnerable. As you’ll have seen in the press, even with access to the best technology and talent, high-profile businesses, financial institutions, and governments are not immune to the possibility of an IT breach.

For an SME or sole trader without

carry your wallet where it can be easily

1. Get a good virus checker and

access to those high-level defences,

accessed in high traffic tourist areas,

keep it up-to-date. I can’t stress that

not only is a breach possible, it’s

you’re far more likely to get robbed.

last bit enough. An out of date virus

likely to be a relatively easy task for

However, if you visit the same area

checker is a hole in your security.

a skilled operator. The sad truth is

and take a few sensible precautions to

Virus checkers work for the most

that there is probably no way to stop

keep your wallet safe, you’re no longer

part by recognising the code that

a determined expert from getting

an easy target and therefore much

makes up the invading software.

access to your system.

less likely to encounter a problem. A

The development of new malicious

few small concessions to security and

software is a constant process and

you’re safer.

just needs a small change to the

Now the reality check. Before you permanently disconnect from the internet it’s worth remembering that

It’s the same with your IT. A few

most of us are of little interest to a

simple precautions and habits will

malicious hacker. The amount of work

go a long way to stop you being

required to get into our systems is

vulnerable. Here are 10 things to get

probably more effort than the return

you started. These are in no particular

is worth. In truth, most security issues

order of importance and you need

on small business IT systems happen

to have a comprehensive approach

because we accidentally created

to your security. Trust me, the people

an easy opportunity. Think of it like

who want access to your system are

encountering a pickpocket. If you

looking for any way in they can find.

code in something like a trojan virus (a nasty little bit of code that hides, like a Trojan horse, inside other code) and it will slip through your checker. All good security programmes come with regular updates, so you just need to get into the habit of updating or setting them to automatically update themselves at regular intervals. 2. Speaking of keeping up-to-date, do the same with your operating system and key software packages. Yes,

Your social media trail can seem innocent enough but think about what you’re posting

sometimes it can be a bit of a pain in the neck waiting for your system to update, but most of these revisions contain security features. Updates on operating systems are common and most of the time they are minor tweaks to the way the system works to increase stability and, as we already said, update the security. 3. Do your backups! And then for really key data, do them again. If you have a cloud-based back-up process

8 | Issue 3 – Operations and Resources


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.