By accepting you will be accessing a service provided by a third-party external to

COVID-19 and the Small Business

COVID-19 and the Small Business

Due to the COVID-19 outbreak businesses have been trying to find ways to keep revenue streaming in without having to suspend operations. This week we thought we would take a look at some of the cybersecurity you will need to get through this difficult economic point. 

Right now most businesses have some sort of cybersecurity platform in place. whether they use a firewall or actively monitor their network or have a more comprehensive solution in place, Protecting their digital assets has to be something that every business does. Unfortunately, even with all the diligent cybersecurity that businesses put in place, some bad things still get through. Since these systems typically never stop, threats are coming into your network every single day.

There have been calls for cyber-clemency. Unfortunately, this is the type of scenario that hackers thrive in. With most workforces working remotely, it stands to reason that they aren’t as protected as they would be if they were still working at their offices. As a result, efforts to improve endpoint security become important to maintaining data security.

There are steps you can take to try and maximize your security, but the most important action that you can take is to train your workforce to know how to protect your business when completing their remote work. Here are four things they should know:

  1. How to effectively manage passwords - Each one of your employees should be versed in how to build a solid password. No two accounts should have the same password, and since most people need to access over 10 different accounts to complete their work, using a password management tool that allows them to secure their passwords in one central location is prudent.
  2. Know how and where to use the Internet - It can be extremely dangerous to use unsecured Wi-Fi in public places when working with proprietary or sensitive data. The fact is that any threat that comes in from the Internet could be a massive problem for your business. Knowing where to use the Internet and what tools they can use to secure data transmission (remote access, VPN, etc.) any member of your staff can help you secure your network by simply being cognizant of their connection decisions. 
  3. Know how to identify threats - One of the best ways that your staff can help you to secure your network is by knowing how to spot phishing threats. Millions of businesses every year fall victim to phishing attacks and if you take time to train your staff, you can do well to keep threats at bay.
  4. Know how to react if something bad does happen - Bad things happen and your business is not immune from them. Whether one of your workers accidentally clicks on a phishing attack and it delivers malware into your network, or hackers use vulnerabilities to get in, problems aren’t the end of the world: as long as there is fast communication and action. You need to ensure that there is a clear pathway for your employees to pass on potential security issues to your IT administrators so that they can find a way to quarantine the issue before it becomes a major problem for your business. 

This is a strange time and with any semblance of normalcy still weeks (or months) away, some business owners are panicking. This is not the time for impulsive decision making. By staying calm, you will make more calculated decisions and you just may be able to get through this situation with your business intact, and with employees that are smarter than when the whole thing started.

If you would like more information about how to keep your business secure while it is spread out, or if you would like to incorporate different technology to make this process more efficient, call the IT professionals at BNMC today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Business Efficiency Data Communication Google Small Business Workplace Tips IT Services Mobile Devices IT Support Cloud Computing Tech Term Hardware Internet Managed IT Services Data Recovery Innovation Ransomware Backup Outsourced IT Users Smartphone Windows Smartphones Android Mobile Device Saving Money Upgrade Information Data Backup Miscellaneous VoIP Windows 10 communications Facebook Server Phishing Browser Business Continuity Microsoft Office Business Management Disaster Recovery Productivity Network Cybersecurity Office 365 Managed IT Services Social Media Passwords Internet of Things Data Management Windows 10 Word Gmail Gadgets Vulnerability Remote Monitoring App Encryption Quick Tips Managed Service Artificial Intelligence Chrome Mobile Office Infrastructure Apps Analytics Company Culture Remote Workers Save Money Settings Managed Service Provider Tip of the week Employer-Employee Relationship Virtual Reality IT Support Money Networking VPN Website Access Control Information Technology BYOD Applications Router Employee-Employer Relationship Apple Big Data Collaboration Firewall Education Maintenance Storage Robot Automation Hacker Data storage Avoiding Downtime Development Antivirus YouTube Paperless Office Government WiFi HIPAA BDR Risk Management Computers Google Drive Unified Threat Management IT Management Data Security Office Tips Bandwidth Content Filtering Display Virtual Private Network Managed IT Managed Services Going Green The Internet of Things Tablet Monitors Vendor Management Chromebook Downtime Printing Document Management OneNote Marketing MSP Password Augmented Reality Data Breach Wireless Managing Stress Solid State Drive Windows 7 Two-factor Authentication IT End of Support Managed IT Service Software as a Service Social Network Customer Relationship Management Scam Training Remote Computing Hard Disk Drive Break Fix Outlook Spam Computing SaaS Bring Your Own Device Operating System Search Social Wi-Fi LiFi Virtualization Humor Mobile Security iOS Holiday Hosted Solution Best Practice Administration Data loss Telephone Systems Retail Business Technology Alert Server Management Mouse desktop Conferencing Touchscreen Laptop Business Intelligence Customer Service Smart Technology Peripheral Google Docs Connectivity Disaster Utility Computing Techology Work/Life Balance IT solutions IT Technicians Optimization Digital Updates Modem FinTech Device Reducing Cost How To Office Lenovo Samsung Hacks Staff Leominster Mixed Reality Statistics Health Shadow IT Private Cloud LED Threats Mail Merge Blockchain Bitcoin Language Value Migration Consulting Downloads Memes Tech Support Google Wallet Regulations Shortcut Distributed Denial of Service Business Growth IoT Uninterrupted Power Supply Laptops VoIP Unified Threat Management Cybercrime Mirgation Recycling Spyware PowerPoint Legal File Sharing Cookies Mobility Batteries Firefox Social Engineering Superfish Computer Care K-12 Schools IBM Bluetooth Comparison Gamification Co-Managed IT Address Permissions Windows 8 Computing Infrastructure Professional Services Websites Unified Communications Drones Social Networking Patch Management Star Wars Managed Services Provider User Error Chatbots Identity Theft eWaste Onboarding GDPR Deep Learning Nanotechnology Print Toner Myths Safety Mobile Device Management Wearable Technology Network upgrade Corporate Profile Slack Hard Disk Drives Specifications COVID-19 Halloween Automobile Motherboard Cables Content Huawei Alerts G Suite USB Messaging Heating/Cooling Multi-Factor Security Holidays Network Congestion Alt Codes Fraud Cost Management Dell Entertainment Vendor Time Management Printer Distribution Identity Continuity Digital Signage Data Warehouse Black Friday Remote Work Screen Reader Cabling Charging Shortcuts Mobile Management Smart Office WannaCry Monitoring Solid State Drives Scary Stories Google Maps Wires Streaming Processor Writing Emergency Licensing Dongle Employee-Employer Relationships Servers Google Calendar Payment Card Budget Business Analysis Dark Web Typing Assessment Hybrid Cloud Network Management Logistics Running Cable Solar Troubleshooting Dark Data Update Cyber Monday Buisness Smart Tech Security Cameras Profiles Current Events Work Spying National Security Sports Voice over Internet Protocol Human Error Memory Cooperation Virtual Desktop Service Level Agreement Analysis Students Legislation Inventory Virus Microsoft Excel Cryptocurrency Hotspot Internet Exlporer Scalability SharePoint Asset Management Politics Compliance Digital Payment Recovery Meetings How To Tracking Cleaning Black Market CCTV Webcam Law Enforcement Notifications Electronic Medical Records Financial Twitter Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana 3D Printing Supercomputer CrashOverride Motion Sickness Mobile Computing Staffing Administrator Processors Taxes Machine Learning Web Server what was your? Unsupported Software IT Budget Regulation GPS IT Consultant Computer Repair Relocation Printers Cameras Mobile Data

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3