top of page

Recognize & Reduce
Your Risky Behaviors

CAUTION: Some of the below may be a bit frightening unless you already have mitigations in place.
 

SMB risks are the same risks as any large enterprise. The attack footprint may not be as wide and the items at risk may not be as numerous, however they still fall into the same categories.  Our plan is to give you the same mitigations and protections, at a price point that is appropriate for your business. 


Now, you may have some risks in mind that you could use some help with but here are some of our favorites that you may not have even thought about that we can help you eliminate.

 

  1. Secession Plan – What if you have a one or two person IT department and don’t have a backup IT guy? What happens if your network engineer goes on vacation, and something goes awry? Did you just receive two weeks’ notice that your CIO is leaving the company and nobody in your company is qualified to lead or assume the role in interim?  We can cover these with you to keep you operational and let your team go on vacation, get married, have babies, almost anything!
     

  2.  System and Data Recovery – You’re backing up your data, right?  Of course you are.  Are you backing up everything that needs to be backed up?  How long do your backups take? How long does it take to execute a recovery?  Can you get back systems and data in a timely manner?  When was the last time you tried to recover or restore data or a system?  Did your sysadmin tell you, “Yep, everything restored as planned” and when you asked him to prove it, he did?  If this one isn’t keeping you up at night, congratulations!  You have a great strategy, or you haven’t thought about this until now. 
     

  3. Attack Surface Reduction – Do you know every item you have on your network? Do you have cell phones and iPads on your network? Can you find out? Did you know that the Colonial Pipeline Ransomware attack (5/7/21) was implemented by accessing a third-party HVAC system, that was connected to the internal network, and it was using the widely published default password?  This slip up shut down or delayed much of the fuel  used to generate electricity to the southeastern U.S.?  Again, do you know what is on your network?  What about in your conference rooms? Can someone plug in a cable into your conference room and get connected to your internal network; are you sure?  Again, we can lock this down and set a plan in place so that things like this just don’t happen. Oh! How are your home based and traveling people connecting to your systems and data? Just thinking out loud…
     

  4. Policies (So important!) – Do your employees know what they can and can’t do with their computers?  Do they know that if they borrow a laptop, it is not to be used for underwear shopping? How about password sharing? Did Tim share his password with Barbara so she could check his email while he was on vacation?  Did Tim or Barbara know that is bad? Have they been told not to do that and why?  Do you and your employees know that they should not use their work email for personal use, and why they shouldn’t do this? Everything from password construction to what steps need to be taken if someone suspects that their email has been compromised or company issued equipment is stolen?  What else can you think of (We have dozens more ready to quickly customize for you.)


Let’s lower that technology risk quickly, easily, and through technology when appropriate.

​

We're not trying to scare you but, if you have all of this covered, you're not scared.

© The CIO 4 All LLC 2024

bottom of page