14th December 2016
As Digital Technology Dampens Democracy How's your Trust in IT Support

As Digital Technology Dampens Democracy How’s your Trust in IT Support?

After a record number of IT security vulnerabilities in 2014, two years on we have seen our fair share of technology that threatens democracy and influences elections – and what a year it has been for politics in the UK and US! 

In a world where currency rates are now manipulated with ease for political gain, how far should our trust expand? Should core subscription ICT services carry a risk rating, like financial products? SMEs place so much care in the hands of cyber security experts but are they placing the future of their businesses in the right hands, like those of the Switch2IT team who are committed to complete technical support and excellent customer service? 

Should ICT services carry a risk rating?

So, surely with elevated scope and global fear of IT security threats, and the reliance of UK SMEs on trusted IT support service providers to manage such risks, it is wise for risk assessments/ratings of those services to become more standardised. After all, you want to know the people fighting your corner are the best people for the job.

Ideally, a risk assessment would aim to understand the ICT company, identifying any risks through analysis of the information/data collected. The following are examples of tasks performed in an enterprise security risk assessment fromISACA Journal(previously Information Systems Audit and Control Association):

  • Review adequacy of existing security policies, standards, guidelines and procedures.
  • Analyse assets, threats and vulnerabilities, including their impacts and likelihood.
  • Conduct technical and procedural review and analysis of the network architecture, protocols and components to ensure that they are implemented according to the security policies.
  • Review and check the configuration, implementation and usage of remote access systems, servers, firewalls and external network connections, including the client internet connection.
  • Review logical access and other authentication mechanisms.
  • Review current level of security awareness and commitment of staff within the organisation.
  • Review agreements involving services or products from vendors and contractors.
  • Develop practical technical recommendations to address the vulnerabilities identified, and reduce the level of security risk.

Start 2017 with Cyber Essentials certified Switch2IT

You can trust Switch2IT, as of 2015 we are Cyber Essentials certified in line with the UK Government's National Cyber Security Strategy  to make the UK a safer place to conduct business online.

This means we are compliant with Cyber Essentials controls so we can bid for government contracts, involving the handling of sensitive and personal information and provision of certain technical products and services. Also, in line with the above risk assessment example, we have fundamental technical security controls in place to help defend against cyber security threats such as hackers and malware.

To find out more about ICT service contracts with professional technicians you can trust, ultra-safe data backups stored in highly-secure data centres and remote IT support that will solve your IT issues rather than cause more, contact Switch2IT today

Latest News

18th July 2017
What's the future for technology post-Brexit?

We realise there are an influx of “what-now-post-Brexit” articles circulating but there is no getting away from the fact that the decision of that marginal majority to pack their bags and move out of the EU will have (and is already having) a significant impact on UK businesses, especially with regard to data protection. What the Switc...

Read More >
26th June 2017
Top tips for acing IoT cyber security

How to maximise Internet of Things cyber security for your business As the BBC's Jane Wakefield explains, “The Internet of Things is about connecting previously dumb objects, such as light bulbs and cameras, to the network”. While it is useful to have everyday objects implanted with software and sensors that make them “smart...

Read More >
16th May 2017
Is Facebook leaving your business open to cyber security threats?

Is Facebook fun risking your business? Who have you seen live in concert? What is your pornstar name? Where were you born? These may all seem like innocuous enough questions – something to pass the time, get to know your Facebook friends better or a bit of a laugh – but have you considered the type of information you are sharing with t...

Read More >
24th April 2017
Looking towards a hi-tech future for your business

Here’s to technological advancements with Switch2IT With the South Downs looking luscious once again and the surrounds of Sussex, Hampshire and Surrey displaying more magnificence with its bluebells per woodland than that high DPI monitor you are lusting after, it makes us realise the technological world is always burgeoning . With this in ...

Read More >