How do you rank your corporate IT security?


January 16, 2013

Security, this will be the big buzz word going into 2013, especially for IT professionals. For many years, many managed IT services organizations have paid lip service to IT security and many of our peers still struggle to understand how to secure the smallest of companies let alone large corporations with strict regulatory or compliance obligations they must meet.

For small companies across the country they often trust a technology professional to secure their corporate IT assets. Many times this technology professional holds the “keys to the kingdom” when it comes to all the business information, customer records, stock and shareholder information and accounting data. How does this make you feel? Do you feel a little vulnerable knowing your IT professional has access to all your corporate data?

Security must be implemented in layers. Just because your IT professional or managed service provider needs to ensure the corporate network is up and running, firewalls are blocking unauthorized access to the network and emails are kept clean from viruses and other threats, doesn’t mean they require administrative access to your ACCPAC or other financial software database or access to your Microsoft DynamicsCRM database, does it?

Many MSPs can be trusted to ensure that your business IT security is set up to the best of their ability. However, as many of our peers elect not to specialize and are generalists in their trade, it can leave a small business vulnerable when all security matters are not covered. This could leave your business at risk.

What should a small business look for when outsourcing their technology support to a firm who understands IT security?

  • Always check references and do your own interviews.  When following up on references ask tough questions. Ask if the company ever had a security compromise and how the IT firm dealt with the security violation. Speak with their reference about data backups and verification that they are ensuring all business data is backed up. Ask to see reports.
  • Look for partnerships with leading security vendors.  Not just the basic partnerships and if in doubt, call the firewall or security vendor to get additional information. Many security vendors allow any partner to join but few have the required competencies and certified professionals who have demonstrated they have what it takes to secure your network.
  • Look for case studies.  Case studies are real life examples. Get case studies from the security company and vendors. Just like references call the company used in the case study to see what they have to say now compared to when the case study was written.

Security is crucial to your business, one small security violation can ruin your business reputation. Don’t take chances with your IT security.

Are you looking for a trusted IT security resource?  Give our team of IT security specialists a call today and book a no obligation review of all your Information Technology security. We don’t take chances and we will ensure all your data is properly protected.

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...