Why Sagiss Doesn't Offer "All You Can Eat" Contracts: Putting Service First
In the dynamic world of IT managed services, finding the perfect balance between service quality, client satisfaction, and business sustainability is...
Solid security is, in many ways, complicated.
Fortunately, there are a few basics you can follow to tighten up your security right away and get high ROI from your efforts.
Check out our list of security dos and don't below.
Topics below include:
Make sure you're financially covered when disaster hits.
Make sure you understand the coverage of your cyber liability insurance policy.
DON'T wait until you need your policy to make sure you're sufficiently covered.
Data backup is the backbone of a disaster recovery plan.
Test your data backups regularly.
DON'T assume your backups are working without testing.
Properly dispose your data storage devices.
Destroy hard drives before disposing.
If destroying the drive is not an option (such as when selling a device with unremovable storage), reformat the drive and overwrite the free space.
DON'T just throw away your hard drive when you've retired it.
Links are of the common ways that threatware spreads.
Think before you click.
Go directly to the appropriate website rather than click the link.
DON'T click a link just because it was sent to you as "URGENT!"
Make sure you're covering the basics of account logins.
Use password managers.
Use long, complicated passwords.
Use multi-factor authentication when possible.
DON'T use weak passwords.
DON'T reuse passwords.
Local access is a great option for breaches.
Lock devices when leaving them unattended.
DON'T leave devices unlocked when attended.
They're more than pesky pop-up reminders.
Install software patches as they become available.
DON'T ignore software patches.
Know who's clicking around where.
Disable obsolete user accounts.
Give users access only to the files and directories necessary to fulfill their duties.
DON'T leave ghost users on your networks and systems.
DON'T give users access to all of your data. Use frameworks like the principle of least privilege and zero trust security to limit access.
In the dynamic world of IT managed services, finding the perfect balance between service quality, client satisfaction, and business sustainability is...
At the heart of any successful engagement with an IT managed service provider (MSP) is the contract that details the scope of work. The Statement of...
Infrastructure as a service (IaaS) offers a flexible, scalable, and cost-efficient solution to simplify the complexity of managing IT infrastructure....