Best Practices Health Assessment
To assist you in assessing your companies IT best practices, this short questionnaire will ask you about a range of good standards used in Industry today.
After you have submitted your answers, we will get a report back to you as soon as we can with the results and some actionable recommendations for improving your IT health.
Having a strong password is the first line of defence for your systems. Having centrally controlled complex passwords adds the first layer of security to your infrastructure.
This is an additional layer of security for your key business systems to thwart hacking attempts.
All your operating systems and programs need to be patched and up to date to fix any security bugs. Software vendors regularly release new updates to fix these bugs as they are discovered.
Backing up your data is critical for both cloud and traditional networks. Data loss through intentional, accidental or malicious reasons can have a detrimental affect on business. The ability and speed of data recovery is also a big consideration for your business model.
In case of device theft or loss, the hard drives need to be encrypted so data cannot be recovered outside of your network. Disk encryption is a good way to ensure this cannot happen. Data breaches like this can incur serious penalties and loss of company reputation.
An antivirus system that is centrally managed is an essential starting point on any network, ensuring it is always up to date and monitoring threats on devices. The next step up is to use an EDR system that actively uses Artificial Intelligence to protect you.
There are regulations that may require you to know exactly what data is being stored and accessed on your network. GDPR regulation requires consumers sensitive data is stored securely.
With the age of mobility, there are various type of devices that now have access to your network and data. Making sure these are secure and only allow correct access to data is critical. Also, tracking device loss and employee access if they leave.
Many companies now carry our regular, ongoing cyber security training to train employees about this. One of the biggest security risks and attack vectors from cybercriminals is by or through the end user, whether intentional or not.
Many companies have decided to make use of cloud resources for their network, so some have severs located in the "cloud" and some onsite while others will have a mix of these options (hybrid). this will impact the complexity of managing your resources.