Providing Managed IT Support and Consultancy to SME businesses, Large Business and Enterprise, Schools, colleges and academies including Microsoft 365 (formally Office 365), Microsoft Teams, Business Voice and Azure. All Tech Services are backed by our Helpdesk based in West Yorkshire covering the whole of the UK.
Get in touch today
Address: Unit 3 Flemming Court, Whistler Drive, Castleford, West Yorkshire. WF10 5HW
Tel: 01977 804928
Email: [email protected]
Please note that all calls are recorded for training and monitoring purposes.
Copyright © Expert Systems Ltd t/a Eitex all rights reserved. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Massive security breaches that involve global companies always make the headlines. It’s dramatic news copy that reminds us all to take care and be security-aware online.
But these big, reported breakdowns in cyber security are the tip of the iceberg. There are many more hacks and breaches that never make the daily news headlines. They are still damaging, undermine business confidence and cause untold disruption and expense.
And the most common place for the attack to originate is from within your own organisation:
A 2016 Cyber Security Intelligence Index report revealed that only 40% of all security attacks came from outside the company involved. So 60% came from inside, and 75% of those were malicious.
Most Targeted Industries
Those industries with the biggest data banks of personal information, or those with huge financial assets are most at risk. However, all companies have a security weak spot represented by their employees.
You can’t avoid trusting staff with company data, or refuse to give access to needed sensitive information. Our MD Dean Spencer hears many companies voice this dilemma. He says, “It can seem like ‘catch 22’. You have to trust people, but how can you be sure you’re not opening the door to all kinds of forbidden activities?”
Build Security from the Inside
Focusing your cyber security in the right places strengthens your weak spots. But you have to know where to look:
Building Awareness
Another part of the ‘catch 22’ conundrum comes from the ways in which many companies operate. We don’t employ most staff members for their knowledge about computer security.
They’re employed for the contributions they make to business success, and many are paid depending on productivity. Staff will take shortcuts or completely ignore processes that make their job more difficult. This could involve anything from banned file sharing to complicated login/password routines. IT systems have to stay secure while still allowing people to do their jobs efficiently.
For every company, the issue revolves around how to make information sharing and communication in the workplace quick and easy, while still maintaining good security standards.
We run Office 365 Taster Days to help answer this exact question. We’ll show you how to beef up your internal security and harness the full power of cloud computing at the same time. There is still time to book a spot on the next free Taster Day on 17th January. We’ll help you strengthen your computing security in 2018 and beyond.
About Eitex
Providing Managed IT Support and Consultancy to SME businesses, Large Business and Enterprise, Schools, colleges and academies including Microsoft 365 (formally Office 365), Microsoft Teams and Microsoft Azure. All tech services are backed by our Helpdesk based in West Yorkshire.
Tags