ManhattanTechSupport.com Rebrands as Homefield IT; Providing Strategic Technology Services Across the Country.

Learn More

3 Common Technology Problems and How to Solve Them

Here are a few simple things you can do to keep your business safer and more efficient.

March 28, 2019Homefield IT

IT Consulting & StrategySecurityTech Support & Managed IT ServicesConstructionEducationFinanceHealthcareLegalReal Estate

We know that businesses struggle to keep their IT in optimal working condition. While some problems take the skilled hand of an expert to fix properly, many other issues are easier to deal with internally, but still, go chronically unaddressed. Here are some of those problems, and tips for how to deal with them.

commonb2bproblems mts 1

Problem 1 – Inconsistent or Lackluster Email Security

Did you know that 92.4% of all malware is delivered via email? That’s from Verizon’s 2018 Data Breach Investigations Report. Not only is email an effective means for hackers to send you malware, but it’s a successful one too. The same Verizon report found that people in the U.S open 30% of all phishing emails, with 12% of people even clicking on the link inside the email.

These statistics point to a two-sided problem. Hackers know that email is a great way to get into your company, and employees are still not being cautious enough about their email usage. So, what’s the best way to help secure your email system against compromise?

  • Enable Two-Factor Authentication (2FA)
    This is the easiest measure to take. Two-factor authentication provides an extra layer of security that goes beyond just simple username and passwords. It requires that users verify their identity with a code sent to an authorized device (usually a cell phone), which can go a long way to keeping unauthorized users out of business email accounts.Unfortunately, 2FA adoption remains stubbornly low at businesses, despite the greatly increased security that it provides. One of the reasons holding 2FA back is that there are several different versions available, including SMS/mobile based solutions, physical keys, app-based models, and others. There are advantages and disadvantages to each of these methods, so pick a 2FA model that meets the specific security and compliance needs of your organization.
  • Teach Employees Email Best Practices
    According to recent data from Wombat Security, 30% of employees in the U.S. don’t even know what phishing is. That’s a big problem, as your team is the first line of defense against email-delivered cyber threats.

Teach your employees how to defend themselves. Go over the basics, such as poor grammar, incorrect spelling, suspicious email addresses, and other phishing red flags. Company policies against bad habits, like leaving email accounts open when you’re away from your desks, can also be very helpful. You may even want to give your staff the occasional quiz to ensure that they’re aware of the most important threats, and to educate them in a fun and memorable way.

Have you implemented email encryption or malware scanning for your email attachments yet? If not, those are two technical measures you can take to improve email security quickly. You may also want to think about enforcing an email retention policy. Regularly deleting emails is a best practice that’s often a vital part of maintaining regulatory compliance.

Problem 2 – Poor IT Vendor Management

According to this survey from the Tech Republic, 57% of companies say that they’re spending more time managing their IT vendors than just two years ago, driven by growing interest in cloud computing, SaaS, and cybersecurity services. IT vendor management is crucial to helping you deliver positive IT outcomes and control the cost of these services.

Engage company stakeholders and subject matter experts to form a workgroup to manage your vendors. While each vendor management process will differ, you’ll want to centralize all the related information, including contracts and related documents into one data repository. This body of information will help you evaluate your IT vendors to ensure they’re still a good fit for your needs, as well as negotiate future contracts.

From a cybersecurity point of view, you’ll also want to create a security risk profile for each vendor. As the number of vendors your company uses grows, so does the difficulty of maintaining strong security. According to PwC, 74% of companies do not have a complete inventory of the third parties that handle personal employee or customer data, a glaring oversight that your vendor management team should seek to rectify.

Proper IT vendor management is critical to any compliance efforts, meaning that this work must be handled with great care in regulated industries like finance and healthcare. In these cases, you’ll likely need the help of a trusted technology partner.

Problem 3 — Poorly Secured Workstations

Cybersecurity is a big, very important topic, which we’ve written a white paper on. One area of security where we’ve noticed many businesses fall short is in securing their workstations.

On any given day, a workstation may get used by several different employees or teams. Because they often hold valuable data that’s directly related to your productivity, these computers must be held to a higher standard of security than your average PC or mobile device.

  • Employ Stronger Passwords
    81% of hacking-related data breaches involve a compromised Because passwords are all that separate your workstation data from a malicious outsider (or insider), you’ll want to make sure that all your passwords adhere to the current best practices — which are constantly evolving.Did you know, for example, that mixing upper-case and lower-case letters are no longer seen as the best way to create a strong password? In fact, the man who came up with that idea in the first place now regrets ever saying it. Instead, combine 3 or 4 unrelated English words and sprinkle a number or two in for good measure. This provides a much stronger foundation for a secure workstation.
  • Secure Administrator Accounts and Privileges
    Administrator accounts have the ability to move data around your computer network in ways that standard user accounts can’t. This makes them attractive to interlopers, who will do whatever they can do to gain administrator access, like social engineering.Start by making sure that all default passwords have been changed and are different on each of your workstations. Using the same passwords on any two workstations could cause problems, by encouraging a successful hacker to move laterally through your network.While you’re at it, make sure that your admins aren’t using their administrator accounts for their daily work. This is another easy fix, but we see it all the time. Having your administrators use a separate account for non-administrative duties will help ensure that if their regular account gets compromised, the account with the privileged access remains secure.

commonb2bprobs mts 2

Do You Need Help Solving an IT Problem?

Are problems with your technology eroding efficiency or morale at your company? We can help! For over twenty years Manhattan Tech Support has been providing reliable, friendly, flat-rate IT support and service to businesses in the greater New York City area. Have a question for our technology experts? Contact us any time at [sales-phone]; we’re happy to be of assistance.

SEE MORE

Kaytuso – the cybersecurity & regulatory compliance division of ManhattanTechSupport.com LLC.

Exceed Digital – the custom software development and business intelligence solutions division of ManhattanTechSupport.com LLC

Related Articles

AI trends in IT management

calendar March 22, 2023

author Homefield IT

Artificial Intelligence Business Intelligence Cloud Services Cyber Insurance IT Consulting & Strategy Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

AI trends in IT management

AI is on everyone’s minds these days. ChatGPT3 and OpenAi have brought what’s possible to the mainstream in a way we haven’t seen outside of movies before. If you’ve spent any time following the trends online, there’s a lot of praise for what’s possible, what could be possible, and what will be possible over the […]

Read More
Best Microsoft 365 features for 2023

calendar March 15, 2023

author Homefield IT

Business Intelligence Cloud Services IT Consulting & Strategy Software Development Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

Best Microsoft 365 features for 2023

Microsoft’s office suite (now called Microsoft 365) has come a long way from its early days as a word processor and spreadsheet platform. These days, Microsoft 365 is a powerhouse of productivity tools that handle everything from word processing to email and everything in between. With all the products and features that come bundled into […]

Read More
Digital Trust – what is it and how does it affect your business

calendar March 8, 2023

author Homefield IT

Business Intelligence Cloud Services Cyber Insurance IT Consulting & Strategy Security Tech Support & Managed IT Services Telecommunications Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

Digital Trust – what is it and how does it affect your business

It seems we hear new stories about cybercrime every day. The stories range from huge ransomware attacks on hospitals to city infrastructure being compromised. It might seem like this isn’t something that you and your business need to worry about, but it matters more each day. Customers need to know that your business (and by […]

Read More