14th December 2016
As Digital Technology Dampens Democracy How's your Trust in IT Support
As Digital Technology Dampens Democracy How’s your Trust in IT Support?
After a record number of IT security vulnerabilities in 2014, two years on we have seen our fair share of technology that threatens democracy and influences elections – and what a year it has been for politics in the UK and US!
In a world where currency rates are now manipulated with ease for political gain, how far should our trust expand? Should core subscription ICT services carry a risk rating, like financial products? SMEs place so much care in the hands of cyber security experts but are they placing the future of their businesses in the right hands, like those of the Switch2IT team who are committed to complete technical support and excellent customer service?
Should ICT services carry a risk rating?
So, surely with elevated scope and global fear of IT security threats, and the reliance of UK SMEs on trusted IT support service providers to manage such risks, it is wise for risk assessments/ratings of those services to become more standardised. After all, you want to know the people fighting your corner are the best people for the job.
Ideally, a risk assessment would aim to understand the ICT company, identifying any risks through analysis of the information/data collected. The following are examples of tasks performed in an enterprise security risk assessment fromISACA Journal(previously Information Systems Audit and Control Association):
- Review adequacy of existing security policies, standards, guidelines and procedures.
- Analyse assets, threats and vulnerabilities, including their impacts and likelihood.
- Conduct technical and procedural review and analysis of the network architecture, protocols and components to ensure that they are implemented according to the security policies.
- Review and check the configuration, implementation and usage of remote access systems, servers, firewalls and external network connections, including the client internet connection.
- Review logical access and other authentication mechanisms.
- Review current level of security awareness and commitment of staff within the organisation.
- Review agreements involving services or products from vendors and contractors.
- Develop practical technical recommendations to address the vulnerabilities identified, and reduce the level of security risk.
Start 2017 with Cyber Essentials certified Switch2IT
You can trust Switch2IT, as of 2015 we are Cyber Essentials certified in line with the UK Government's National Cyber Security Strategy to make the UK a safer place to conduct business online.
This means we are compliant with Cyber Essentials controls so we can bid for government contracts, involving the handling of sensitive and personal information and provision of certain technical products and services. Also, in line with the above risk assessment example, we have fundamental technical security controls in place to help defend against cyber security threats such as hackers and malware.
To find out more about ICT service contracts with professional technicians you can trust, ultra-safe data backups stored in highly-secure data centres and remote IT support that will solve your IT issues rather than cause more, contact Switch2IT today.
12th October 2017
Cyber Security: The Good, the Bad and the Ugly
Cyber Security: The Good, the Bad and the Ugly From tides of positive change via the IT networking bods at Netgear to despair in the tiresome encryption debate to undignified squirming from Microsoft about paying their taxes, this month Switch2IT explores the Good the Bad and the Ugly from the IT security and technology industries. Gettin...Read More >
22nd September 2017
Switch2IT says On Your Bike to data breaches like Equifax
On Your Bike, Data Breaches! There has been so much news about data breaches just lately that it is unreal – at least, the Switch2IT team wishes it was. The latest reports reveal that the Equifax data breach was a lot worse than first thought and that investigations into the extent of its impact are ongoing. As well as 143 million Americans...Read More >
25th August 2017
The complexities of UK data protection law
Who does data protection law protect and what are the parameters? The Information Commissioner’s Office (ICO) recently published a blog that caused a few eyebrows to rise among the Switch2IT team. Steve Eckersley ICO Head of Enforcement, who aims to “take purposeful risk-based regulatory action where obligations are ignored, exam...Read More >
18th July 2017
What's the future for technology post-Brexit?
We realise there are an influx of “what-now-post-Brexit” articles circulating but there is no getting away from the fact that the decision of that marginal majority to pack their bags and move out of the EU will have (and is already having) a significant impact on UK businesses, especially with regard to data protection. What the Switc...Read More >