Performing an IT Health Assessment is necessary because you have to periodically inspect the work that your IT guys are doing. People will respect what you inspect. Make sure that you aren’t being cornered by terms you don’t understand.
Welcome! To another episode of IT Insecurities the show dedicated to helping you as a business owner conquer your insecurities about information technology by giving you the information you need to succeed.
MY Name is Nathan Zimmer, the self proclaimed Geek Speak Guru and Tech Talk Translator coming to you today from an undisclosed location here in Tulsa Oklahoma. It is currently 4:11 AM on a Saturday.
I am amped and excited today to bring you some more knowledge you can’t get in college, and I would know… but my goal is to talk about boring things in a way that won’t leave you bored or confused.
If you haven’t already checked out our previous podcast you can by clicking the link below.
The Importance of Systems: Why we do what we do
On today’s show we break down “IT Health Assessments. Why do we need them?” and look at what the Security Breach stats from Forbes really mean for you as a small business owner.
Why do we need an assessment? There is some business owner out there who is asking even now why do I need to do an assessment? My business is running fiiiiiine.
Well dear listener I’m glad you ask, I would direct you to the stats. I have with me today a few numbers that could be shocking.
So the answer to why you need this would be you don’t if you want to permanently dissolve your business.
But according to 2017 Disaster Recovery Statistics that Businesses Must Take Seriously
I have a report published back in August of 2019 and here’s the title…
Today I want to break down these horrifying stats and see 3 specific action steps we can take to mitigate the risk of your business being one of these companies affected.
“According to Risk Based Security research newly published in the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 have seen more than 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records.
Perhaps even more remarkable is the fact that 3.2 billion of those records were exposed by just eight breaches. As for the exposed data itself, the report has email (contained in 70% of breaches) and passwords (65%) at the top of the pile.”
This is crazy. Many of these breaches occur but without some form of IT Health Assessment the business would never know its records were even compromised.
“The majority of breaches reported this year had a moderate to low severity score,” the report stated and exposed 10,000 or fewer records.
This is important because many businesses wrongly assume they are too small to be on the radar of the threat actors. The truth is that it is all about the data, and small businesses often have less well-guarded data stores.
Your average cyber-criminal is lazy and will scrape up any data exposed by running automated online scripts looking for unsecured databases. The big breaches make the headlines, but bread and butter everyday incidents make the money for most threat actors out there.
Overview
You have to know where you are to know where you are going.
Businesses run on goals. Financial Goals, Production Goals, but in small businesses IT goals usually don’t get the primary focus.
The whole point of having IT is to get the most out of your technology. That doesn’t happen by default. You have to have goals for things you want to see implemented in your company. Many business owners don’t know that their systems could operate more efficiently.
But before you can attain your goals you have to obtain a better knowledge about your systems.
“ And you will know the truth, and the truth will set you free.”
John 8:32The information we present in this podcast is really just the first step in finding the truth about where your IT business systems are at
And that in the end that truth will set you free.
Over the 20+ years of working with businesses we’ve developed what we affectionately call our Motion Management System.
It’s a 6 step process that we use to help businesses manage their computer systems and help them reach their business goals.
And a lot of the information today comes directly from the questions that we would ask in our free IT assessment. This is really just a way for us to get to know any potential business that wants to work with us.
We include questions in the 5 areas of business IT health.
And today we will take you through some of these questions we ask our clients when they sit down with us for their free IT assessment.
The best way to think about this process is to keep a doctor’s visit in mind. When you go to the doctor they start by asking you some basic information about your body.
They establish a baseline of information and then when the doctor examines you and goes to prescribe a medication he knows that what he’s giving you is the right thing.
It’s the same thing with the IT health assessment. It’s like a doctor’s visit for your company’s IT systems. But to continue this analogy further scheduling your free IT assessment with us is like going to the doctor and only having to pay for the prescriptions he prescribes but getting the actual visit for free.
It’s important to get all your staff in the same room. An talk about the issues. This is part of the IT Health Assessment and essential to productivity of your IT systems.
Have there been any problems you haven’t heard about? What are they?
This is important because when you know the type of issues you’ve been having you can determine what systems you may need to implement.
According to the 2016 and 2017 Accenture report says that 69% of companies experience some kind of social engineering attack.
According to a 2018 study, two out of ten employees or about 17 percent of people fall victim to these social engineering attacks unwittingly compromise allowing hackers access to his or her computer, or even the entire company’s network.
At the same time according to a cyber security report put out by fireeye says that it takes an average of 146 days to detect a successful phishing attack.
That’s basically 5 months before you realize what happened!!
I actually have an example phishing email to read.
HR@knowbe4.com
10:45 AM (1 hour ago)
to: stus
Stu,
I noticed that a user named securitybull72 (claiming to be an employee) in a security forum posted some negative comments about the company in general (executive compensation mainly) and you in specific (overpaid and incompetent). He gave detailed instances on his disagreements, and doing so, may have unwittingly divulged confidential company information regarding pending transactions.
The post generated quite a few replies, most of them agreeing with negative statements. While I understand that the employee has the right to his opinion, perhaps he should have vented his frustrations through appropriate channels before making this post. The link to the post is located here (it is the second one in the thread):
www.spiceworks.com/forums/security/234664/2345466.
Could you please talk to him?
Thanks.
Social Engineering Attacks: Common Techniques & How to Prevent an Attack“If you think that this is because they are not techies or they do not know what social engineering is, think again. The study found that three percent of security professionals were guilty of not being cautious enough to check out the link or make sure files attached to emails are safe to download.”
Social Engineering Attacks by the Numbers: Prevalence, Costs, & ImpactIt’s not just the untrained its everyone. That’s why it’s so important to train and test employees. This is part of the IT Health Assessment. Determine where your training procedures are currently.
The next thing you want to do is bring your senior staff together. What of these issues can we address? Get everyone in one room together and encourage communication.
Action Step
Here’s the thing, it’s all about accountability. Many times business owners get involved with their IT systems when something goes wrong. They don’t pay attention to what an IT technician or what their employees are searching until you get a virus on your systems all because someone wanted to click the link saying they want a free trip to Hawaii. And that right there is the best way to always be caught off guard with a lawsuit or potential production halting incident. ]
When you don’t have someone who can clearly outline what kind of maintenance is being performed on your systems each month then there is no accountability.
“People respect what you inspect.”
Clay ClarkeAnd really that is what the whole show is about.
We publish these shows to train you as a business owner so that your IT support staff doesn’t take advantage of you. We give you some of the basic information you need to succeed and maybe you don’t know everything there is to know but you know enough to know when an IT support technician is scamming you or being lazy.
In other words you know enough to ask the right questions.
“The majority of breaches reported this year had a moderate to low severity score,” the report stated and exposed 10,000 or fewer records.
This is important because many businesses wrongly assume they are too small to be on the radar of the threat actors. The truth is that it is all about the data, and small businesses often have less well-guarded data stores.
Your average cyber-criminal is lazy and will scrape up any data exposed by running automated online scripts looking for unsecured databases. The big breaches make the headlines, but bread and butter everyday incidents make the money for most threat actors out there.
Forbes (https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-41-billion-records-in-first-six-months-of-2019/#694b4cd9bd54)Train. Continue to train. Train some more. Then when you think that they know, train some more. Make sure that the IT Health Assessment includes this training.
Imagine what you could do if your systems worked for you and not against you.
If you want to see what these systems really entail, remember to subscribe to the podcast and contact us a call at 918-218-2228 or at info@centupli.com to schedule your FREE IT HEALTH ASSESSMENT today.
As always this is Nathan Zimmer giving you the IT knowledge you can’t get in college about the processes and systems that work.
For more helpful information checkout some of our blog posts and other resources.
Schedule a free assessment today and see how your business can prosper!
Get in touchPodchaser is the ultimate destination for podcast data, search, and discovery. Learn More