Security for Micros: a rational guide

The problem is we don’t believe that there are millions of people who would steal your living and life’s work if given the chance to do so; but there are.  There were close to a billion ransomware attacks in 2018 alone.  It is not a matter of if you or your friend’s business will have a breach, it is when.  And, if it weren’t for some magic already happening in the background, your mailbox would be inundated with phishing attempts; but instead you only see a few attempts per week. 

What happens when you let your guard down?

Am I trying to scare you?  No, I just want to encourage best practices; like clean underwear in case of acute posterior exposure due to unplanned vehicular mishap.  Or like Grandma used to say, “Put on clean underwear in case you have an accident?”  Seriously Grandma, that’s what worries you most?

Best Practices for the Everyday Non-Techie Computer User

I meet with this group every Tuesday (Neurotic Grandma Recovery Group, the “NGRA”)*, and I tell them of my exploits in computer land, and they say, “We aren’t very techie.”  What follows is intended as the non-techie guide to asking the right questions.

Do We Have a Modern Firewall?

Between your micro business and the internet is a device called a “router” or “modem” or “firewall”.  These are three different things but often a micro business has one device that does all three jobs, and maybe a couple more.  Ask the Person in Charge of your Technology (the “PCT”)** if your firewall blocks unused data ports coming in and blocks malicious websites requests from inside.  If your PCT looks at you funny because they don’t know what you are talking about, call us.  If you are the PCT and you have a funny look on your face, call us.

Are My Computers Getting the Latest Updates?

This is so basic, but if you updated your hygiene regularly (had a shower and put on clean underwear) your grandma would be less worried.  Ask your PCT** if your computers are configured for automatic software updates?  Again, any funny faces, blank stares, or duh-I’m-not-sures, call us.

Does Our Anti-Virus Program Block Suspicious Behavior?

Gone are the days where daily virus definition updates are sufficient for blocking the bad guys.  Second generation anti-malware programs block suspicious activity, such as file encryption.  Your data simply can’t be held for ransom.  Does your anti-virus do that?

Do We Know How to Recognize Phishing?

People are your weakest link.  They too do not believe that there are millions of people who would steal someone’s living in a heartbeat.  It is not in our nature to suspect every piece of incoming communication, but it is that kind of vigilance that will protect everything you have built.  I know, I know, I am starting to sound irrational right there.  But, does your PCT know how to recognize phishing?  Have they trained you and the rest of your team? No?  Call us, phone number is in the top right hand corner.

* I do meet every Tuesday with a group, but nothing to do with grandmothers, I know nothing about the neurosis of grandmothers
**I made the PCT (Person in Charge of your Technology) acronym up while writing this blog.  It’s not techie lingo.

Previous
Previous

Three Reason’s to Choose Microsoft 365 Over Google Workspace

Next
Next

2.4 GHz vs 5 GHz: Which should you use? – The Basics