Over half of all businesses have experienced some kind of cyber-attack this year – read more here. That’s a staggering amount. With technology being the backbone of all businesses, cyber-attacks will continue to rise and be a threat to all business – regardless of your industry.
That’s why at Greystone we have created Cyber Security Check – a product specifically aimed at the small business – to ensure that your business has the right foundations in place to provide more protection from potential cyber-attacks.
Our Cyber Security Check looks at the 7 key areas of your IT network to ensure you are running your systems securely and give you peace of mind.
End Point Protection
We look at the desktops, laptops and servers in your business to see if they have the appropriate security settings in place to stop viruses, ransomware and malware attacks. Maintaining your computers securely is essential to keep any business up and running.
Network Configuration & Firewalls
Your network is the foundation of all your IT systems and the firewall shields your systems from the open internet. We assess the structure and configuration of your network and firewall to make sure it is set up securely and correctly to reduce the risk of attack.
Without good use of passwords, your IT systems can easily be compromised. This can be from an external hacker or a rogue insider. We review your password policy and suggest ways to improve your if necessary.
With data now being commoditised, every bit of data that a business holds is a hacker’s dream steal. So, this element has to be very well protected and thought through. We look at access to file structures and core databases to ensure access permissions are appropriate to keep unwanted people out of your sensitive data.
Back-Up & Recovery
Having all your critical data backed up is essential. We review your data backup processes and check they are enough to keep you from losing data in the event of a disaster or cyber-attack.
Monitoring and Compliance
Knowing what is happening on your network is key to IT security. We can suggest ways to continually monitor activity and alert you, so you know immediately if something suspicious is going on.
Educating your staff on cyber-security threats is a massive part of an overall security plan. Often, it’s the human, not the computer that causes a security breach. We can look at your current training and suggest ways to build on it to improve overall security.
Greystone: Making Sense Of IT And Software Solutions