Posts

I really hate hearing from customers and prospective customers that we were right and that they wish they had taken our advice to harden their systems and implement tighter security controls before their breach. Feedback from customers suggests the inconvenience of implementing additional controls is often what keeps them from taking action as opposed to the cost, which is negligible for some of the most effective controls like Multi-Factor Authentication (MFA). If you think the controls are inconvenient, you should spend some time visiting with someone who has been through a breach.

The most likely cyber-attack a small business will experience is an email breach which quickly lead to real payment fraud losses, reputational damage, and compliance risk. Once a criminal organization (yes, there are organizations attacking your small business) has success breaching one email account, you can expect the attacks to increase in volume and sophistication. Businesses can dramatically reduce email breach risk with relatively little cost and yes, some minor inconvenience.

Take the Next Steps

If you own a business or have are responsible for managing business risk, you need to take steps to protect your business, your shareholders, your employees, your vendors, and most importantly your customers. You must take action to implement additional controls. Start by asking your IT professionals to implement controls for yourself so you can understand first-hand how the controls protect your business and the level of inconvenience the controls may cause. This puts you in the best position possible to make informed decisions about how to protect your business and champion initiatives to tighten controls.

If you’ve done nothing to date, start with implementing MFA for your business email and then work with an IT professional to constantly review and improve security controls around all your systems and data.

I’m right and I hope I never have to tell you “I told you so”.

Your credentials can be phished, period.  If you think you’re above being phished, you’re wrong.  We all have weak moments and the criminals are really good at praying on our whims and emotions.  Trust me, you can be phished.  Don’t put so much pressure on yourself.  Implement multi-factor authentication (MFA) wherever possible to protect your accounts even if you are phished.  This is so important that we put together a video to show you how.  Watch this video.  Please just give us a call if you want help or want to discuss additional configuration options to ease implementation for your business.  We will be happy to help.

If you don’t know anything about Office 365 Multi-Factor Authentication please check out our blog and video from December 2017 for a complete overview https://www.gowestit.com/office-365-multi-factor-authentication.

 

 

Your business is vulnerable to cyber criminals, period.

The truth is that no business is fully “secure”. Rather, businesses assume various amounts of acceptable risk. Your responsibility is to figure out where your organization lies on the security spectrum, how much cyber risk you are willing to comfortably assume, and continually act to reduce your risk to those levels.

We understand that most businesses, especially SMB’s, can’t and won’t do everything their IT provider may recommend. This is true for a myriad of reasons including operational efficiency, timing, focus on your core business, and of course budget considerations. We also believe that most businesses do not realize the amount of risk which they current assume. If you did, you would likely already be doing more!

To this end, Go West IT has developed our “Top Ten Task to Mitigate Cyber Risk”

Review your security posture with your current IT provider and discuss how to implement the next best thing you can do to reduce your risk (HINT: If you’ve done nothing to date, start with backups, patching, and multi-factor authentication). If you need help please give us a shout, our experts will help you recognize, plan, and take the steps to mitigate your risk.

Understand where you are today… know where you want to be tomorrow… build the roadmap to get you there. You can reduce your risk, get started today!

David Lewien
President, Go West IT

Download the PDF: Top Ten Tasks to Mitigate Cyber Risk
303-795-2200
info@gowestit.com
www.gowestit.com

Leveraging the Cloud – 

Many businesses today use cloud services of some kind, but not every business has committed to moving to the cloud or is leveraging cloud services to their advantage.  Cloud services aren’t right for every situation but it is important for businesses to consider cloud options whenever IT changes are at hand.  Go West IT can help cut through the buzzwords and show you when and how to leverage the cloud to benefit your business. This includes everything from SaaS solutions, such as hosted Exchange with Microsoft Office 365, to comprehensive IaaS (Infrastructure as a Service) solutions in the Microsoft Azure, private white-label or Go West IT cloud environments.

Leveraging our extensive experience and strong vendor relationships, Go West IT was uniquely positioned to be on the forefront of the cloud services movement.  As a Gold Microsoft Cloud Solution Provider, Go West IT provides end to end management of your Microsoft cloud services.  Go West IT was recognized as the 2017 US SMB Azure West Region Partner of the year at this year’s Microsoft Inspire event.  Click here to watch the video to hear more about Go West’s cloud adoption story.

Contact us today to begin charting a course to meet your cloud services objectives.  303.795.2200 or info@gowestit.com

Go West IT helps business choose and implement IT infrastructure strategies.  This includes on premise and cloud implementations.  Part of our role is to help customers navigate the unknowns and this is particularly true when it comes to choosing a cloud provider or cloud strategy.

One of our Network Engineers sent an email to our technical staff this morning to let us know the legal team at Amazon Web Services (AWS) has contemplated some scenarios other cloud providers haven’t covered in their terms of service.  If you are worried about how your IT infrastructure might hold up in the event of a zombie apocalypse it is worth a read.  If you don’t have insomnia and a few hours to kill, pay particular attention to paragraph 57.10 near the bottom of the document.

https://aws.amazon.com/service-terms

In all seriousness, there are significant differences between cloud providers and it pays to work with a partner like Go West IT with implementation experience across many cloud providers that gives us first hand knowledge of how to choose the right fit for your needs.