MSP Success Magazine Special Edition: Lisa & Brian Johnson | Page 15

There are two common pitfalls . One , an organization will buy cyber insurance and then blindly attest to these measures , even if they ’ re not properly implemented , making their insurance void . Or two , cyber insurance companies don ’ t clearly identify the requirements , and then you ’ re not even aware that you ’ re operating outside of compliance . Therefore , the first thing we recommend is understanding these requirements and taking the proper measures to ensure you ’ d be covered in the case of an incident .
UNDERSTAND YOUR VULNERABILITY
Beyond having proper cybersecurity insurance for your organization , you must understand where your vulnerabilities are and immediately take steps to remedy them and increase your security . That ’ s why the first thing we do when speaking with prospective clients is go in and test everything security-wise — and customers are often shocked with the results . For example , it ’ s common for us to be able to pull hundreds ( yes , hundreds !) of passwords off a computer and map them to dark web breaches just by having users click a single link . Now imagine if that was a real phishing email sent from a cybercriminal .
Something else that people often don ’ t think about ( until it ’ s too late ) are the old pieces of software that sit in the corner of your computer somewhere . If nobody is looking at these things , it can become ground zero for a major hacking event that starts a chain reaction throughout the organization just because of one piece of old software ( or even a new piece of software that hasn ’ t been patched properly ) that a cybercriminal was able to attack . As we like to say at AVC Technology , don ’ t be the low-hanging fruit for these hackers . Take steps to bolster your security before a breach occurs .
USER TRAINING
Another way you can proactively address your cybersecurity protocols is by having solid user training . We ’ re all human , and sometimes we go too fast and click on something we shouldn ’ t — it happens . However , by putting your employees through user training , you can increase their awareness , which has been shown to significantly decrease your chances of becoming a victim of cybercrime . And there are many different kinds of attacks to be aware of and prepared for , including ransomware , malware , supply chain attacks , and phishing , to name a few .
In addition to consistent user training , we always recommend having multiple layers of security for added protection . This could be as simple as having basic antivirus software installed , going one step further and having endpoint security in place on the computers , or , for clients that require more advanced security , there are zero-trust tools that will prevent anything from running that hasn ’ t been approved prior . Ultimately , no matter what level of security you decide on for your organization , it ’ s crucial that your employees not only understand what to look for but they know what procedures to follow if there is a cyber breach .
MONITORING AND MANAGEMENT
There ’ s a big misconception that once you put some cybersecurity protocols in place , you can basically “ set and forget it .” This is simply not true . In order to ensure that your organization is protected to the fullest extent possible , you ( or your IT partner ) need to constantly monitor and manage your cybersecurity protocols to limit your risk . Not only that but you ’ ll want to work with a company that spends time vetting the products and understands how to install , manage , and support these new tools .
For example , when cloud services became the new thing in IT , many organizations switched over and got a false sense of security , thinking that the cloud would do everything for them . However , if you don ’ t have someone who knows how to manage these services , you could actually be at an increased risk of things like password compromises or data loss . And if you experience a critical breach , that could be the end of your organization , especially if you ’ re a small to medium-sized operation . So , instead of gambling with the previous protocols you ’ ve put in place , it ’ s always best to be doing ongoing assessments , audits , and vulnerability management on a recurring basis .
FINAL THOUGHTS
Although cybersecurity may seem overwhelming on the surface , we hope these actionable steps will help you become more comfortable with and aware of what you should be doing to keep your organization safe . Start by understanding your cyber insurance policy and ensuring compliance , knowing where your vulnerabilities are and working to resolve them , training your users properly so that they can be the first line of defense , and monitoring and managing your cybersecurity solutions to make sure they continue to protect your organization . By doing these simple things , you can be proactive in the cybersecurity battle and keep yourself shielded from cybercrime in this ever-evolving digital age .
Still looking for further support ? Our team at AVC Technology is on hand to help you implement robust cybersecurity protocols , operate within compliance , and bolster your overall security for your organization .
Brian & Lisa Johnson President & Vice President
AVC Technology
MSPSUCCESS . COM | 15