Security, this will be the big buzz word going into 2013, especially for IT professionals. For many years, many managed IT services organizations have paid lip service to IT security and many of our peers still struggle to understand how to secure the smallest of companies let alone large corporations with strict regulatory or compliance obligations they must meet.
For small companies across the country they often trust a technology professional to secure their corporate IT assets. Many times this technology professional holds the “keys to the kingdom” when it comes to all the business information, customer records, stock and shareholder information and accounting data. How does this make you feel? Do you feel a little vulnerable knowing your IT professional has access to all your corporate data?
Security must be implemented in layers. Just because your IT professional or managed service provider needs to ensure the corporate network is up and running, firewalls are blocking unauthorized access to the network and emails are kept clean from viruses and other threats, doesn’t mean they require administrative access to your ACCPAC or other financial software database or access to your Microsoft DynamicsCRM database, does it?
Many MSPs can be trusted to ensure that your business IT security is set up to the best of their ability. However, as many of our peers elect not to specialize and are generalists in their trade, it can leave a small business vulnerable when all security matters are not covered. This could leave your business at risk.
What should a small business look for when outsourcing their technology support to a firm who understands IT security?
- Always check references and do your own interviews. When following up on references ask tough questions. Ask if the company ever had a security compromise and how the IT firm dealt with the security violation. Speak with their reference about data backups and verification that they are ensuring all business data is backed up. Ask to see reports.
- Look for partnerships with leading security vendors. Not just the basic partnerships and if in doubt, call the firewall or security vendor to get additional information. Many security vendors allow any partner to join but few have the required competencies and certified professionals who have demonstrated they have what it takes to secure your network.
- Look for case studies. Case studies are real life examples. Get case studies from the security company and vendors. Just like references call the company used in the case study to see what they have to say now compared to when the case study was written.
Security is crucial to your business, one small security violation can ruin your business reputation. Don’t take chances with your IT security.
Are you looking for a trusted IT security resource? Give our team of IT security specialists a call today and book a no obligation review of all your Information Technology security. We don’t take chances and we will ensure all your data is properly protected.
“Thank you and Cohn Consulting Corporation for improving the quality of our lives!!! The new computer system is all that we had hoped for and more… From the initial design phase to the implementation of our new network, the process was smooth and enjoyable.”