By accepting you will be accessing a service provided by a third-party external to

Watch Out for the One Percent

Watch Out for the One Percent

Do you know the phrase, “Locks only keep out the honest?” The idea is that even though you lock your doors, there is only a thin layer of glass and good intentions stopping a criminal from entering your home through a window.

Cybersecurity is a lot like that, and preventing the one percent of threats that slip past your security is crucial to your business. Let’s talk about it.

One Percent of Threats Equals a Hundred Percent of the Damage

Very few things in the computing world are infallible. If it is connected to the Internet and hackers really want to get into it, they will find a way. No antivirus can guarantee they will protect you from one hundred percent of all viruses ever. No anti-spam solution can promise you that they will never let a piece of junk mail through. These solutions are designed to reduce the risk. Antivirus can only protect you from known viruses, and only when the definitions are kept up to date in the software. Anti-spam often uses machine learning to analyze a message and determine if it has similarities with millions of other spam messages. 

This means there is room for a tiny amount to slip through as cybercriminals tweak and adjust their tactics to try to get past the security systems put in place.

In other words, you could have the most expensive, most carefully managed and monitored IT security in place, and still be at risk. You could meet and exceed any compliance standard and still be at risk. Granted, it’s a greatly reduced risk than you would have without the security, but that one percent that slips through the cracks could still lead to massive amounts of damage.

How Do I Stop the One Percent from Harming My Organization?

That’s the big question, right? If you paid for that expensive firewall and that centralized antivirus and you’ve locked down your end points as much as possible, what more can you do?

Employee Training

Sometimes it just takes awareness to prevent an issue from becoming a bigger problem. Offering training and resources to keep your staff aware of threats can go a long way. There are some pretty simple lessons that are pretty easy to understand regardless of one’s technical level:

  • Don’t open attachments you didn’t expect.
  • Don’t click on the links that seem skeptical or too good to be true.
  • Don’t share passwords, and don’t use the same password on multiple accounts.
  • Don’t plug in random USB devices, especially if you found it.
  • Report anything suspicious to IT.

Teaching users how to do some basic tasks like taking screenshots for errors and identifying phishing attacks can also go a very long way.

Don’t ‘Set and Forget’ IT Security (or Backups, or New Policies, etc.)

A huge factor in almost every preventative IT solution, whether it be your antivirus or your cloud backup, is that the developers behind it are playing an ongoing game of cat and mouse with cybercriminals. New viruses and threats come out all the time, exploits and security holes are discovered that need to be patched, and everything needs to be applied to your hardware/software to keep you and your data safe.

That’s why it is crucial to monitor and manage every device and endpoint on your network. Every workstation, router, access point, server, firewall, and security solution needs to be carefully monitored and kept updated. Solutions that become so old that the developer chooses to no longer support them need to be retired and swapped out.

If this isn’t happening, those investments aren’t getting their money’s worth.

Stay Ahead of the Curve

BNMC can help. We WANT to help. We want New England businesses to thrive and grow and never have to pay off a ransomware attack or lose thousands of dollars and thousands of hours dealing with stolen data.

If protecting your business is important to you, give us a call at 978-482-2020 and ask about getting a free network audit, just to determine where your weak points are.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 06 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing User Tips Privacy Cloud Network Security Email Microsoft Hackers Hosted Solutions Efficiency Software Computer Business Malware Data Communication Google Small Business IT Services Workplace Tips Mobile Devices Hardware IT Support Internet Cloud Computing Tech Term Smartphone Data Recovery Managed IT Services Android Backup Innovation Mobile Device Ransomware Users Outsourced IT Windows Information Smartphones Upgrade Saving Money Disaster Recovery Data Backup Facebook Miscellaneous Phishing Network Browser Office 365 Cybersecurity VoIP Microsoft Office Server Business Management communications Social Media Windows 10 Business Continuity Managed IT Services Productivity Windows 10 Passwords Internet of Things Data Management Vulnerability Remote Monitoring Gadgets Quick Tips Gmail App Word Mobile Office Managed Service Encryption Chrome Managed Service Provider Apps Infrastructure Artificial Intelligence Virtual Reality Tip of the week IT Support Money Government Employer-Employee Relationship Remote Workers BYOD Networking Information Technology Google Drive Settings VPN Access Control Applications Router Analytics Save Money Remote Work Company Culture Website Hacker Data storage Office Tips Conferencing Employee-Employer Relationship Avoiding Downtime Development Spam Antivirus WiFi Big Data Computers HIPAA Paperless Office BDR Bandwidth Content Filtering Display IT Management Data Security Business Technology Unified Threat Management COVID-19 Virtual Private Network Education Apple Storage YouTube Robot Maintenance Collaboration Firewall Risk Management Automation MSP Document Management Augmented Reality Remote Computing Managed Services Two-factor Authentication Managing Stress Managed IT Service Laptop Wireless Solid State Drive Outlook The Internet of Things Customer Relationship Management Scam Computing SaaS Training Wi-Fi Bring Your Own Device Operating System OneNote Break Fix Social Holiday LiFi Data Breach Virtualization Hard Disk Drive Humor Hosted Solution Windows 7 Downtime Search Retail Alert Administration Marketing Software as a Service Best Practice Mobile Security IT Mouse Social Network Data loss Going Green Server Management Vendor Management Telephone Systems Touchscreen Compliance Business Intelligence Monitors Chromebook desktop Managed IT How To Printing iOS Tablet Password Regulations End of Support Virus Safety Spyware Firefox Superfish K-12 Schools Scalability Buisness Uninterrupted Power Supply Bluetooth Comparison Cookies Computer Care IBM Address Permissions Computing Infrastructure Professional Services Mobile Device Management Sports Utility Computing File Sharing Social Networking Inventory Deep Learning Updates Virtual Desktop Patch Management Star Wars Battery Device Reducing Cost User Error Chatbots Asset Management eWaste Mixed Reality Network Congestion Nanotechnology Peripheral Alt Codes LED Threats Identity Theft Wearable Technology Network upgrade Migration Consulting Specifications Writing Corporate Profile Alerts USB Laptops Heating/Cooling Multi-Factor Security Motherboard Shadow IT Cables PowerPoint Fraud Cost Management Mobility Batteries Automobile Time Management Printer Identity Memes Continuity Budget G Suite Screen Reader Management Charging Typing Co-Managed IT Cybercrime Smart Office Dark Data Update Dell Black Friday WannaCry Emergency Licensing Dongle Current Events Managed Services Provider Cabling Servers Google Calendar Gamification Wires Onboarding GDPR Dark Web Assessment Print Toner Myths Politics Google Maps Network Management Solar Slack Hard Disk Drives Smart Tech Policy Cryptocurrency Content Huawei Work/Life Balance Work Messaging Customer Service Cyber Monday Data Warehouse Office Samsung Cooperation Service Level Agreement IT solutions Entertainment Vendor Health Private Cloud Legislation Voice over Internet Protocol Google Docs Digital Signage Microsoft Excel Hotspot Internet Exlporer Hacks Shortcuts Halloween Mobile Management Tech Support SharePoint Holidays Monitoring Solid State Drives Connectivity Procedure Bitcoin Streaming Processor Digital Payment Techology IT Technicians Distribution Optimization Google Wallet Employee-Employer Relationships Smart Technology Troubleshooting Business Analysis Social Engineering Digital Lenovo Staff Leominster Hybrid Cloud Meetings Disaster Statistics Modem FinTech Business Growth Mail Merge Blockchain Language Value Security Cameras Scary Stories Profiles Websites Downloads Payment Card Legal Spying National Security Twitter IoT PCI DSS Windows 8 Human Error Running Cable Memory VoIP Unified Threat Management Mirgation Logistics Recycling Unified Communications Drones Analysis Students Shortcut Distributed Denial of Service Printers Crowdsourcing Webcam Personal Information Botnet 3D Printing Error Cortana Point of Sale Ben McDonald shares Processors Mobile Computing Travel Machine Learning Unsupported Software Financial Supercomputer CrashOverride Staffing Computer Repair Motion Sickness Relocation Mobile Data Administrator Taxes Regulation How To IT Budget Recovery Web Server what was your? GPS Black Market IT Consultant Law Enforcement Cameras Notifications Tracking Electronic Medical Records Physical Security Cleaning Upgrades Gadget Emoji CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3