Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  New Year tech resolutions for your business

New Year tech resolutions for your business

Businessman Knocking on New Year 2016 Door

This time of year many of us vow to drink less and exercise more, but you should also think about getting your business into better shape. Vowing to do better in 2016 might be the best business decision you make this year.

If work slows down a bit over summer then it’s the perfect time to tackle those jobs you’ve been putting off. Two of the most important tasks are reviewing your security and back-up procedures — bolstering your defences and protecting your data should disaster strike.

Your security audit could be as simple as reviewing your password policies to ensure you’re not reusing passwords and that your older passwords meet your current minimum requirements in terms of length and complexity. It’s also worth checking whether more of your service providers have added the extra protection of two-factor authentication.

While you’re at it, ensure that all your computers, handheld devices, networking equipment and network storage devices are running the latest security patches. Check that your antivirus is up to date along with applications such as instant messaging, web browsers and your Virtual Private Network client. Don’t forget Adobe Flash and Reader, which are regularly updated to address security issues.

If staff are connecting to the internet while away from the office then it’s important they use a VPN to protect their activities from prying eyes. You can never be too careful when using public Wi-Fi hotspots or Ethernet connections in cafes, hotels and airport lounges.

Your security audit shouldn’t just consider external threats. Perhaps you’re due for an audit of admin rights and secure access throughout your organisation, assessing who needs a physical key to the office door as well as who needs the digital keys to the business.

People are the weakest link in the security chain. It’s important to discuss social engineering threats with staff, such as phishing attacks. Threats vary from bogus invoices, hoping you’ll pay them without question, to cryptolocker attacks which encrypt your data and hold it to ransom.

Your best insurance policy against cryptolocker attacks is an extensive and reliable backup regime. Don’t just rely on USB sticks and network storage drives located in your office, it’s vital to incorporate offsite backup in case fire, flood or theft claims both your computing devices and your onsite backups.

Backing up your My Documents folder might not be enough. Consider where important applications like your email client store their files and ensure these folders are also backed up.

Even if you’ve already got a solid backup system in place, it’s important to check that it’s running smoothly. You should regularly check your backups and test your recovery procedures to ensure that everything is in order, rather than waiting until disaster strikes to discover that your backup system has let you down. Also assess the security of your back-ups to ensure they don’t present an easy back door to hackers.

Many businesses ignore security and backup issues until it’s too late, so get on top of them early in the new year to ensure smooth sailing in 2016.

FacebookTwitterGoogle+Share

Recent News

snapdragon

Ever since the computer market shifted from desktop PCs to laptops, there’s been a significant balancing act going on between the needs of computer users for processing power to run programs, and the needs of those same users for battery power to keep their laptops going. At a simplified level, the harder you push a… More 

Apple-Apple

For the longest time, the generally accepted knowledge was that Apple’s Mac computers didn’t get malware or viruses. Apple even went so far as to mock its PC opposition in the famous “Mac vs PC” ads for the issues they had around security and malware, to a fairly solid effect. While Apple’s Macs do still… More 

intel

Quite often these days when we hear about a major security flaw, it’s to do with the underlying software that we’re running on our PCs, whether it’s a dodgy browser exploit, some kind of flaw in productivity software or even “free” content sites that are awash with malware. It’s not quite so often that we… More 

kindle

I’ve recently spent some time checking out Amazon’s latest Kindle e-reader, the 2nd generation Kindle Oasis. It’s the “luxury” choice in Amazon’s e-reader lineup, with a luxury price to match and a few new features to try to lure in those who love reading above other pursuits. One of the key new features is the… More