Miosa Twenty-Four Pty Ltd https://www.miosa24.co.za Building Relationships through technology Wed, 16 Sep 2020 04:40:54 +0000 en-ZA hourly 1 https://wordpress.org/?v=5.5.1 https://www.miosa24.co.za/wp-content/uploads/2019/08/cropped-Favicon-Logo-32x32.png Miosa Twenty-Four Pty Ltd https://www.miosa24.co.za 32 32 171345966 Marketing Drip S10_06 – What are Poison attacks and how can it affect your business form_06 https://www.miosa24.co.za/2020/09/16/marketing-drip-s10_06-what-are-poison-attacks-and-how-can-it-affect-your-business-form_06/ Wed, 16 Sep 2020 04:40:54 +0000 https://www.miosa24.co.za/2020/09/16/marketing-drip-s10_06-what-are-poison-attacks-and-how-can-it-affect-your-business-form_06/ With technology becoming smarter every minute, the risks are increasing by the minute as well. Learn more about the lesser-known IT risk to your business–Poison Attacks, in this whitepaper http://cmap.amp.vg/web/cjsghpbr20kao Marketing Drip S10_06 - What are Poison attacks and how can it affect your business form_06 3 Marketing Drip S10_06 - What are Poison attacks and how can it affect your business form_06 4

]]>
1700
5 Important IT checklists that no SMB should miss: Part-2 https://www.miosa24.co.za/2020/09/14/5-important-it-checklists-that-no-smb-should-miss-part-2/ Mon, 14 Sep 2020 07:32:34 +0000 https://www.miosa24.co.za/2020/09/14/5-important-it-checklists-that-no-smb-should-miss-part-2/ 5 Important IT checklists that no SMB should miss: Part-2 7

5 Important IT checklists that no SMB should miss: Part-2

In our last blog, we discussed 2 of the 5 important IT checklists that every SMB should have. In this post, we cover the other 3, namely, IT training, Data Backup, and BYOD checklists.

IT Training checklist

Your IT staff is not the only one who needs IT training. Everyone in your office does. An IT training checklist serves as a good process document for any new staff or for any staff working on new hardware or software. Following the IT training checklist can help cut down the learning curve, and ensures the hardware/software is leveraged in the best possible way, thus making your staff more efficient. Here’s what your IT training checklist can offer.

  1. Rules and regulations regarding software and hardware use
  2. Links to user manuals/instruction videos with how-tos for the software and hardware in use
  3. Information about whom to contact if there’s a need for troubleshooting
  4. Training schedules for each hardware/software, cyberthreats
  5. Information about whom to contact if there’s a perceived cybersecurity breach

Your IT staff is not the only one who needs IT training. Everyone in your office does. An IT training checklist serves as a good process document for any new staff or for any staff working on new hardware or software. Here’s what your IT training checklist should contain.

Data backups checklist

There are a number of factors that can affect the accessibility and quality of your data. Data backups are key to ensuring your data is not lost. You should maintain a checklist or a policy document that covers this aspect. Your data backups checklist should cover

  • What are the different data sets that need to be backed up
  • How often do each of those data sets need to be backed up
  • Where (location/device) will the data backup occur
  • How will the data backup happen
  • Who will be responsible for the data backup

BYOD policy checklist

In the current business environment where companies allow their employees to use their own devices for work purposes, a BYOD (Bring-your-own-device) checklist is a must. This checklist should answer questions like

  • Who is allowed to bring their devices to work (employees of some departments that deal with sensitive data like, the HR/accounts may not be allowed to do so)
  • What kind of devices are allowed/approved? For example, you can specify a version below which a certain OS may not be allowed, as it may be outdated, exposing your entire network to any security threat that it may be vulnerable to
  • Who is responsible for ensuring the security patches and antimalware protection is up-to-date

Having these checklists/policy documents do not ensure your IT infrastructure is always safe and secure, or never suffers a downtime. These checklists merely help in cutting down instances of security breaches or downtime and go a long way in helping you respond positively to any IT crisis that may befall your business. What we have discussed here is just the proverbial ‘tip of the iceberg’. Your checklists have to be comprehensive, in-depth and cover every angle with a clearly defined action plan for any IT contingency. Reaching out to an experienced MSP for assistance will ensure you leave no loose ends.

5 Important IT checklists that no SMB should miss: Part-2 8

]]>
1696
Marketing Drip S10_02 – Thinking of migrating to the Cloud https://www.miosa24.co.za/2020/09/14/marketing-drip-s10_02-thinking-of-migrating-to-the-cloud/ Mon, 14 Sep 2020 04:30:49 +0000 https://www.miosa24.co.za/2020/09/14/marketing-drip-s10_02-thinking-of-migrating-to-the-cloud/ Why are businesses switching to the Cloud? Click here to find out http://cmap.amp.vg/web/xu07fkcd0erq Marketing Drip S10_02 - Thinking of migrating to the Cloud 11 Marketing Drip S10_02 - Thinking of migrating to the Cloud 12

]]>
1695
5 Important IT checklists that no SMB should miss: Part-1 https://www.miosa24.co.za/2020/09/11/5-important-it-checklists-that-no-smb-should-miss-part-1/ Fri, 11 Sep 2020 07:54:10 +0000 https://www.miosa24.co.za/2020/09/11/5-important-it-checklists-that-no-smb-should-miss-part-1/ 5 Important IT checklists that no SMB should miss: Part-1 15

5 Important IT checklists that no SMB should miss: Part-1

IT checklists are a great way to analyze, understand and take the necessary steps to meet your IT requirements. In this blog, we discuss 2 of the 5 important IT checklists–Hardware/software and Cybersecurity.

When creating a checklist for hardware/software purchase, use, and installation, answer the following questions.

  1. How do you determine what hardware/software is needed?
  2. What about installation? Who will be doing it? Incorrect installation can end up resulting in loss of time and, in case of faulty hardware installation, it can also mess up the new hardware
  3. What is the process for the procurement of new hardware and software? Do you have regular vendors who you approach or do you start looking for a suitable one once the requirement arises
  4. Establish a policy for operating systems, because not all hardware/software is compatible with all OS.
  5. What about updates, security patches, and upgrades? Who will be responsible for them and how often?
  6. Who is responsible for software installation when there’s a new user requirement

Cybersecurity training can help reduce incidences of cybersecurity breach due to a lapse of judgment from your employees. Here’s what your cybersecurity checklist should cover- all security-related aspects of your IT. For example

  1. Create and implement a password policy that you want your staff to adhere to. Cover password hygiene, acceptable passwords, password sharing, reuse, password update rules, etc.,
  2. When someone quits your organization or no longer works in the profile that they were working in, how is the access issue addressed? Spell out the rules and regulations regarding the removal of a user from the network, changing passwords, limiting access, etc., Along the same lines, also cover new user initiation into the IT network.
  3. Include policies for data sharing–which data can be shared, where and by whom, who has access, the level of data access rights, etc.
  4. Spell out the plan of action to be taken in the event of a cybersecurity breach. Whom to contact, how to quarantine the affected systems, what steps are to be taken from the legal perspective (disclosure of the breach, data security violation penalties, and so on…) how to prevent such future events, etc.,
  5. Your cybersecurity checklist should not only cover the digital aspect of IT security, but also the physical aspect of it. Establish rules and regulations for physical access to data.

Interested in learning more? Watch out for our next blog that offers pointers on IT training, data backup and BYOD checklists.

5 Important IT checklists that no SMB should miss: Part-1 16

]]>
1684
Bringing an MSP on board means you don’t have to worry about your IT- Learn more https://www https://www.miosa24.co.za/2020/09/11/bringing-an-msp-on-board-means-you-dont-have-to-worry-about-your-it-learn-more-https-www/ Fri, 11 Sep 2020 04:48:52 +0000 https://www.miosa24.co.za/2020/09/11/bringing-an-msp-on-board-means-you-dont-have-to-worry-about-your-it-learn-more-https-www/ Bringing an MSP on board means you don’t have to worry about your IT- Learn more https://www.miosa24.co.za/ Bringing an MSP on board means you don’t have to worry about your IT- Learn more https://www 18

]]>
1683
Know your IT risks https://www.miosa24.co.za/2020/09/09/know-your-it-risks/ Wed, 09 Sep 2020 07:45:13 +0000 https://www.miosa24.co.za/2020/09/09/know-your-it-risks/ Know your IT risks 21

Know your IT risks

Whether you have your in-house IT team, or have outsourced your IT needs to be taken care of by a Managed Services Provider, you need to know what are the possible risks to your business from the IT perspective. Having an IT risk checklist can help you be better prepared for an IT emergency.

Getting started

In order to assess your IT risks, you need to first know your IT landscape. Answer questions like

  • What role is IT going to play in the success of your business
  • What areas is IT supporting your business in, currently
  • What new roles can you foresee for IT in improving your business efficiency
  • Do you have any new technology in mind that you want to implement in the next year
  • If you have your in-house IT team, what kind of staff structure do you see in the next year
  • If you are planning to expand your in-house IT team, how many team members will you need to bring onboard and what will be the cost associated with this decision
  • Would it be more effective and efficient to hire an MSP instead to supplement your in-house IT department
  • What is your IT budget for the year

The checklist for your IT risks

The next step would be to create a checklist of your IT risks. At this stage, you should be answering questions like

  • What IT risks are most relevant to you? For example, data privacy is a serious concern for a business operating in healthcare, while phishing can be a bigger concern for an accounting firm. Another angle to look into are environmental risks. For example, do you operate in a hurricane-prone area, or someplace prone to wildfires? Make a list of risks most relevant to you and assess the possibility of them happening to you. Such assessments will help you arrive at the key safety measures that you need to take, as a business, to keep your data safe.
  • In the worst case scenario, if your IT infrastructure were to fail, how long can you survive before it will be difficult for you to bounce back? Can your business operate without your key IT systems working? If not, how long can you afford to keep it shut?

Whether you have your in-house IT team or rely on an MSP for your IT maintenance, this exercise will help you understand your key IT goals and the possible impediments to them, and help you survive in the event of an IT emergency.

Know your IT risks 22

]]>
1682
Marketing Drip S10_03 – What happens when your biggest asset https://www.miosa24.co.za/2020/09/09/marketing-drip-s10_03-what-happens-when-your-biggest-asset/ Wed, 09 Sep 2020 04:45:20 +0000 https://www.miosa24.co.za/2020/09/09/marketing-drip-s10_03-what-happens-when-your-biggest-asset/ Are your employees your biggest asset or biggest threat? Find out in our whitepaper, employees and cybersecurity http://cmap.amp.vg/web/bl68ey29riiyh Marketing Drip S10_03 - What happens when your biggest asset 25 Marketing Drip S10_03 - What happens when your biggest asset 26

]]>
1681
What to consider when investing in cyber insurance https://www.miosa24.co.za/2020/09/07/what-to-consider-when-investing-in-cyber-insurance/ Mon, 07 Sep 2020 07:37:46 +0000 https://www.miosa24.co.za/2020/09/07/what-to-consider-when-investing-in-cyber-insurance/ What to consider when investing in cyber insurance 29

What to consider when investing in cyber insurance

As a business, you are probably aware of the term, cyber insurance. With the cybercrime rates rising consistently, cyber insurance is increasingly becoming a necessity for survival. Here are a few things to consider before you sign up with a cyber insurance service provider.

Risk analysis

First, perform an internal risk analysis. Research to understand what kind of cybercrimes are most rampant in your industry and ensure your insurance policy covers those for sure. Like we discussed before, the most basic of cyber insurance covers data breach and associated costs, but you definitely want more than just that.

What is the scope of your policy

Be clear about the scope of your policy before you sign the dotted line. Remember that cyber insurance functions on the same principles and policies as like any other insurance, which means there will be deductibles, waiting periods and exclusions. Be sure to ask your insurance service provider about them. You don’t want to find out you weren’t covered by insurance until after the attack, at the time of claim. Here are a few things to ask your insurance company in this regard.

  1. Does the policy cover you if a breach happens via your sub-contractor or vendor and makes you liable to your clients? If your cyber insurance doesn’t cover those, then make sure your vendors and sub-contractors have cyber insurance to cover you or sign some kind of an indemnity contract with them so you are covered in the event of such incidents.
  2. In case of an action byyour employee causing the breach, such as clicking on a fraudulent link or sharing data accidentally to a dubious email ID, will you still be covered?
  3. Ask your insurance provider to clearly spell out any deductibles, exclusions and window periods that may exist
  4. Check with your insurance provider on what would be your liabilities as the insured. For example, there may be rules regarding anti-virus measures, data safety and security measures, IT training, timely data backups and IT audits, etc., that you may have to follow in order to be eligible to be covered under the insurance in the event of a breach

Before you sign up, do your research thoroughly, get proposals from multiple insurance service providers and opt for a policy that covers your needs the most and the best. Sometimes, service providers may be willing to make additions or modifications to an existing policy to meet your exact requirements, which may work best for you.

What to consider when investing in cyber insurance 30

]]>
1680
Marketing Drip S10_05 – Poison Attacks 101: What you need to know https://www.miosa24.co.za/2020/09/07/marketing-drip-s10_05-poison-attacks-101-what-you-need-to-know/ Mon, 07 Sep 2020 04:37:28 +0000 https://www.miosa24.co.za/2020/09/07/marketing-drip-s10_05-poison-attacks-101-what-you-need-to-know/ Poison Attacks 101: Learn how the most vicious form of cybercrime that can affect you http://cmap.amp.vg/web/cpf2kflv7jabd Marketing Drip S10_05 - Poison Attacks 101: What you need to know 33 Marketing Drip S10_05 - Poison Attacks 101: What you need to know 34

]]>
1679
Marketing Drip S10_01 – Everything you need to learn about Cloud Security https://www.miosa24.co.za/2020/09/04/marketing-drip-s10_01-everything-you-need-to-learn-about-cloud-security/ Fri, 04 Sep 2020 04:33:55 +0000 https://www.miosa24.co.za/2020/09/04/marketing-drip-s10_01-everything-you-need-to-learn-about-cloud-security/ Everything you need to learn about Cloud Security in this whitepaper, Cloud Security 101- Link http://cmap.amp.vg/web/bbvoet3bxjo2i Marketing Drip S10_01 - Everything you need to learn about Cloud Security 37 Marketing Drip S10_01 - Everything you need to learn about Cloud Security 38

]]>
1678