• Skip to main content
  • (617)933-5060
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
Facebook-f Twitter Linkedin-in
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

Archives for May 2016

7 steps for SMBs to protect against cybersecurity threats

May 24, 2016 by securewebsite

Did you know that Symantec surveyed small and medium-sized businesses (SMBs) and found that 21% considered cyber security a “nice to have” feature? Does that concern you a little bit?

The cost of cybercrime in the United States is staggering. Check out these numbers! According to Ponemon Institute; Hewlett-Packard (HP Enterprise Security), these are the costs last year (2015) for each industry, in million US dollars:

  • Financial services: 28.33

  • Energy and utilities: 27.62

  • Defense and aerospace: 23.18

  • Technology: 16.45

  • Communications: 14.9

  • Services: 12.93

  • Transportation: 12.08

  • Retail: 11.96

  • Education and research: 11.41

  • Industrial: 11.02

  • Healthcare: 9.78

  • Public sector: 9.37

  • Consumer products: 8.68

  • Hospitality: 8.23

That’s over 200 million dollars combined!

In contrast to the somewhat relaxed attitude of SMBs over cybersecurity, individual Americans have a completely different attitude about it. Cybercrime takes the top two spots for the crimes consumers worry the most about!

cybercrime

Ponemon Institute and HP found that 100% of businesses have suffered attacks caused by viruses, worms or trojans. Every single business has dealt with this! Perhaps cybersecurity isn’t really a “nice to have” feature. Of the businesses surveyed, 97% had also experienced malware attacks.

This means that your business will deal with the fall out of cybercrime, guaranteed! The forecast states 100% chance of storms. Start with the following steps to prepare:

  1. Backup your data! Don’t learn this the hard way after an expensive loss. Set up regular backups in a secure location away from your hosted data (such as the cloud).

  2. Set up multifactor authentication and require it of every employee.

  3. Train everyone on security. It should be part of every single employee’s job description today: understand and know what they should do to protect themselves and the company from cyber threats. Teach them about phishing, malware, viruses, etc.

  4. Be aware of what you send via email. Treat it as though anything you attach or write could be posted on a public forum.

  5. Have a definite plan for responding to breaches.

  6. Use the free resources provided by the US Small Business Association for cybersecurity.

  7. Know when to get an expert to help. If you don’t have the knowledge from your staff to test website security, conducting risk assessments or defining a cybersecurity breach procedure, hire an IT Consultant.

We have an enterprise security solution to protect your network and vital data through ongoing monitoring and support. Don’t waste another minute thinking this is simply “nice to have.” You are statistically at risk, so take the steps to limit your risk and exposure today.

Filed Under: Small Business

13 steps to shut down shadow IT

May 10, 2016 by securewebsite

31285988_SHave you heard of shadow IT? Sounds like the no-good-broad-shouldered-thug that you don’t want to meet in a dark alley. You may be creating shadow IT at your company if your software is outdated, your policies are complicated or you’re lacking in IT support. Do you ever hear whispered conversations about how it’s not worth it to call the help desk because they won’t get around to helping for days? You may be breeding dark alleys and shadow IT.

Shadow IT “occurs when employees circumvent procedures to use unapproved services and software.”

Imagine. You’re working closely with your project team, smooth sailing so far (unheard of, right?), and you run into a bump in the road in regards to sufficient privileges on the network for a team member to accomplish their tasks. You’re going to need to call IT to make the request. Fear sets in and you anticipate the slip to your schedule. Unless…

Shadow IT steps in.

How can you create an environment where your teams aren’t in fear of contacting IT and instead follow the appropriate protocols for requesting rights and privileges?

Networkworld asked some of the top security execs out there to chime in on how to successfully do this.

  1. Acknowledge that it’s happening.

  2. Allow a grace period for requests to happen under IT management without repercussions.

  3. Empower your IT staff to contribute.

  4. Adopt an open-door IT policy for all new projects.

  5. Make “customer-first” the goal for IT.

  6. Create an atmosphere where IT serves as a trusted adviser.

  7. Provide services as good or better than what staff can find on their own.

  8. Make their lives easier: implement single sign-on.

  9. Automate.

  10. Stop using the word “users”; change the mindset.

  11. Instead of shutting off access completely, try granting access to download, but not upload.

  12. Allow a corporate version, such as corporate Box.net accounts if staff are using personal Dropbox accounts.

  13. Provide a service catalogue of what’s approved and make it easy for employees to find.

Do some of these steps feel overwhelming? If you lack the IT expertise to properly build, manage and protect your data, we’re here to help. We can set you up with the ability to get control of shadow IT and implement a number of these steps above. Let us help you with network assessments and auditing, IT asset tracking and reporting, cloud solutions and security and monitoring services.

We can help you shut the door on shadow IT.

Filed Under: Small Business

  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

© ORAM Corporate Advisors 2019. All rights reserved | Policy & Privacy