Here’s 5 security holes every business must work to plug and secure better, from CMIT Solutions

1. Backup and Disaster Recovery (BDR)

A company’s electronic data is one of its most valuable—and fragile—assets. A shocking number of small businesses either rely on manual backups or just keep their fingers crossed. For maximum protection, a business needs not only an automated backup system (to minimize human error), but also a thoroughly tested and simple to implement disaster recovery plan to get the business back up and running in the event of a disaster. Companies should implement such a disaster recovery plans as part of an overall business continuity strategy designed to minimize any disruption to business operations.

2. Adherence to Security Protocols

Your car alarm won’t give you much protection if you leave your keys on the hood. As with many security systems, the human factor is often one of the weakest links. Poor login management, shared passwords, and other shortcuts leave your computers and network open to threats. Educating your staff about the importance of adhering to security measures (and making sure they do) is of the upmost importance.

3. Outdated Equipment

This especially applies to network infrastructure such as routers, bridges, and firewalls. Just because a device still works doesn’t mean it’s working securely. As security protocols have progressed, especially in the wireless space, manufacturers have had to increase performance to keep up with increasingly complicated encryption schemes. Running older hardware makes you an easier target (and therefore more attractive) for hackers.

4. Unsecured Mobile Devices

Yes, employees love the convenience of accessing their email via a smartphone, but smartphones are also easy to lose (as are laptops and USB drives). What if that device held sensitive information? Or provided a direct path into your corporate server? Again, adherence to proper security protocols is paramount. All devices need to be protected with robust, regularly changing passwords, and all employees need to understand and adhere to a written “mobile device acceptable use” policy.

5. Lack of Cohesive IT Strategy

Most companies expand their IT infrastructure as their business grows. As such, they often find themselves with a patchwork system. Smart business owners see IT as a strategic business asset, not just a necessary evil. Investing in a coherent, well-designed IT infrastructure and strategy not only provides security and increased performance, but also does good things for your bottom line.

No disaster recovery plan?

Unsure if your backups are correctly backing up? Don’t wait for disaster to strike before putting a data security and business continuity plan in place. Sign up for a free technology and security assessment from CMIT, and we’ll show you how to protect one of your business’s most valuable assets—your data.

Reprinted from Smallbiz Technology courtesy by Ramon Ray





5 security holes every business must work to plug


Read more

Social Selling - LinkedIn Navigator

We are in the era of Social Selling (using Social Media to sell).  We hear it everywhere.

Why does social selling matter?:


Read more

Facebook Advertising

 More than 1.8 billion people use Facebook each month

In 1 out of every 5 minutes – people are using a smartphone on Facebook

Read more

Marketing on the Rise

Are you looking for a new upcoming way to market?

This technology is not new but is becoming increasingly popular and seems to be a great bang for the buck.


Read more

Facebook Live What is it???

Facebook Live is a new feature of Facebook that is becoming a great marketing tool. It marks an important trend in the social media and mobile technology worlds.


Read more

What’s in those Terms of Use?

How often do you really take the time to see what is in the terms of use statements? Most people are in a rush to get or update the app, use the software or join, they simply skim over or don’t even read it.


Read more

LIASB Members Center

Welcome to the new LIASB Member Center where business gets done.


Read more

Push Response

Google, Apple, and Firefox released new technology called Push Response which allows you to get more traffic and sales by sending messages directly to people’s computer desktops and to android mobile devices.


Read more

Ransomware attacks

The world's biggest cyberattack has hit at least 150 countries and infected 300,000 machines since it started spreading last Friday.

The victims include hospitals, universities, manufacturers and government agencies in countries like Britain, China, Russia, Germany and Spain.


Read more

Landing Page Best Practices

You only have about 6 seconds to grab someone’s attention and then they are on to the next thing. Here are some tips for creating compelling landing pages that will entice them to take action.


Read more

Dangerous escalation in ransomware attacks

When Hollywood Presbyterian Medical Center revealed that it paid 40 bitcoins — roughly $17,000 — in ransom to hackers who essentially held the hospital’s computer system hostage, it marked a dangerous escalation in the high stakes surrounding ransomware.


Read more

Beware downloading some apps or risk “being spied on”

It was reported the other day that Google had removed several Apps from the Play Store because they were associated with terrorist organizations.


Read more