Most Businesses we deal with have a hard time understanding why we structure our services into packages. We do this so you’re getting everything you need to cover your business properly, we don’t take this lighthearted either, as we know when things go bang, the first fingers will be pointed towards us. We’re not doing this because we’d like to empty your wallets, we’ve done extensive research into our products, and because of our experience, we know what the strengths and weaknesses are of most products in the market today.
Think about buying the wrong tool for the job, it’s going to cost more time and money in the long run. And we get that most models are based on maximum output with minimum input. A thing that keeps popping up over and over again is cyber security. A grudge purchase that mostly gets pushed away by; “it won’t happen to us”.
We live in South Africa, so you are no stranger to security, you most likely pay the car guard to look after your car, you have a home alarm with a panic button, you have CCTV surveillance, and you have insurance to cover when these things fail. The same goes for business cyber security. Most security issues don’t start with a dramatic breach. They start with quiet neglect, an update missed here, a password left unchanged there, a staff member who’s not quite sure what a phishing email looks like.
– Remove access for ex-employees or contractors
– Review admin privileges, who has “God mode,” and do they still need it?
– Check for shared logins (still a no-no, even if it “just works”)
– Confirm MFA (multi-factor authentication) is enabled on key apps
– Run a spot check on password strength, especially for admin accounts
– Remind staff to use a password manager (Keeper)
– Confirm that operating systems, browsers, and applications are being updated automatically
– Run updates on network gear (routers, firewalls, etc.), these often get missed
– Decommission old or unused devices properly
– Confirm backups are running and test a file restore
– Ensure offsite/cloud backups are secure and encrypted
– Document the restore process in case someone else needs to do it
– Run a short phishing simulation or refresher training
– Share examples of recent scams or threats
– Make sure staff know who to contact if something feels “off.
– Review your Acceptable Use and Security Policy, is it still relevant?
– Check your compliance requirements (HIPAA, POPIA, etc.) and audit logs
– Log and document your quarterly review for accountability
Cheers for now,
Ryan
Recent Comments