The Valley’s Leading IT Company I Grapevine MSP

Is Your It Super Secure

Is Your IT Super Secure?

Local businesses should secure their IT infrastructure and online services immediately, according to our in-house cyber security expert.

Multi-factor authentication and highly complex passwords are now basic security measures that every company should implement. However, we recommend that you also implement these three items across all of your business devices and IT services:

Conditional Access

There has been a steady increase in the enforcement of cyber security policies in Microsoft environments over the past few years. Among these is conditional access, which can be managed by your IT provider of choice.

A conditional access policy allows business-approved devices to access company data and cloud services.

Prior to Microsoft’s Intune company portal service, conditional access was limited to highly secure business networks. However, the ease of implementation and the ability to pre-approve personal cell phone devices make it possible for any size company to become secure and keep the bad guys (or girls!) out.

Zero Trust Applications

As with conditional access, a zero-trust application policy restricts all software from loading and installing unless it is on a pre-approved IT list. Your computer/laptop will not be allowed to load an application that is not on the application whitelist, which is one of the most effective ways to prevent viruses and ransomware in your business network.

To install a new app or software, simply log a ticket with the IT helpdesk and go through the approval process.

Monitoring of Login Locations

Last but not least, we have location monitoring. With most online services today, such as Microsoft 365, you can see where your staff is logging in based on their IP address.

In the last quarter of 2021, 41 percent of all global attacks originated in China, according to new data, citing a “sophisticated hacker network,” among other things.

It is important to monitor staff logins weekly to help identify anomalies and report potential compromises.

Staff should be informed that login locations are being monitored.

To learn more about how we can help you ensure that your existing IT infrastructure and online services are secure and following these best practices, contact us for an introductory meeting.

Share this post

Skip to content