14th December 2016
As Digital Technology Dampens Democracy How's your Trust in IT Support
As Digital Technology Dampens Democracy How’s your Trust in IT Support?
After a record number of IT security vulnerabilities in 2014, two years on we have seen our fair share of technology that threatens democracy and influences elections – and what a year it has been for politics in the UK and US!
In a world where currency rates are now manipulated with ease for political gain, how far should our trust expand? Should core subscription ICT services carry a risk rating, like financial products? SMEs place so much care in the hands of cyber security experts but are they placing the future of their businesses in the right hands, like those of the Switch2IT team who are committed to complete technical support and excellent customer service?
Should ICT services carry a risk rating?
So, surely with elevated scope and global fear of IT security threats, and the reliance of UK SMEs on trusted IT support service providers to manage such risks, it is wise for risk assessments/ratings of those services to become more standardised. After all, you want to know the people fighting your corner are the best people for the job.
Ideally, a risk assessment would aim to understand the ICT company, identifying any risks through analysis of the information/data collected. The following are examples of tasks performed in an enterprise security risk assessment fromISACA Journal(previously Information Systems Audit and Control Association):
- Review adequacy of existing security policies, standards, guidelines and procedures.
- Analyse assets, threats and vulnerabilities, including their impacts and likelihood.
- Conduct technical and procedural review and analysis of the network architecture, protocols and components to ensure that they are implemented according to the security policies.
- Review and check the configuration, implementation and usage of remote access systems, servers, firewalls and external network connections, including the client internet connection.
- Review logical access and other authentication mechanisms.
- Review current level of security awareness and commitment of staff within the organisation.
- Review agreements involving services or products from vendors and contractors.
- Develop practical technical recommendations to address the vulnerabilities identified, and reduce the level of security risk.
Start 2017 with Cyber Essentials certified Switch2IT
You can trust Switch2IT, as of 2015 we are Cyber Essentials certified in line with the UK Government's National Cyber Security Strategy to make the UK a safer place to conduct business online.
This means we are compliant with Cyber Essentials controls so we can bid for government contracts, involving the handling of sensitive and personal information and provision of certain technical products and services. Also, in line with the above risk assessment example, we have fundamental technical security controls in place to help defend against cyber security threats such as hackers and malware.
To find out more about ICT service contracts with professional technicians you can trust, ultra-safe data backups stored in highly-secure data centres and remote IT support that will solve your IT issues rather than cause more, contact Switch2IT today.
26th June 2017
Top tips for acing IoT cyber security
How to maximise Internet of Things cyber security for your business As the BBC's Jane Wakefield explains, “The Internet of Things is about connecting previously dumb objects, such as light bulbs and cameras, to the network”. While it is useful to have everyday objects implanted with software and sensors that make them “smart...Read More >
16th May 2017
Is Facebook leaving your business open to cyber security threats?
Is Facebook fun risking your business? Who have you seen live in concert? What is your pornstar name? Where were you born? These may all seem like innocuous enough questions – something to pass the time, get to know your Facebook friends better or a bit of a laugh – but have you considered the type of information you are sharing with t...Read More >
24th April 2017
Looking towards a hi-tech future for your business
Here’s to technological advancements with Switch2IT With the South Downs looking luscious once again and the surrounds of Sussex, Hampshire and Surrey displaying more magnificence with its bluebells per woodland than that high DPI monitor you are lusting after, it makes us realise the technological world is always burgeoning . With this in ...Read More >
30th March 2017
IT solutions: It's a game of two halves
Own goal for cloud computing Recent reports reveal that cloud computing is not the omnipotent IT solution that some industry pundits believed it would be. That is, cloud outages are beginning to show the cracks in all the marketing hype! We read in ComputerWeekly.com how the Amazon cloud storage outage is a stark reminder of the role humans still...Read More >