{"id":2279,"date":"2017-01-03T08:00:04","date_gmt":"2017-01-03T08:00:04","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2279"},"modified":"2021-07-07T05:15:47","modified_gmt":"2021-07-07T09:15:47","slug":"network-security-5-things-every-small-business-know","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2279","title":{"rendered":"Cybersecurity tips: 5 Things Every Small Business Should Know"},"content":{"rendered":"<p>Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.\u00a0 <a href=\"https:\/\/tsisupport.com\/tsistaging\/study-reveals-more-than-50-of-smbs-have-experienced-a-data-breach-in-past-year\/\">Why would anyone care to target me?<\/a><\/p>\n<p>The truth is that hackers would love nothing more than to gain access to your sensitive company data.\u00a0 It\u2019s why we decided to develop a list of 5 things every small business should keep in mind through the new year\u2026<\/p>\n<p><strong><span style=\"color: #800000;\">Normal Business Hours?\u00a0<\/span> <\/strong><\/p>\n<p>The internet doesn\u2019t shutdown when we are done for the day.\u00a0 Your network is vulnerable to an attack any time day or night.\u00a0 Therefore, developing a <a href=\"https:\/\/tsisupport.com\/tsistaging\/it-services\/network-security\/\">network security<\/a> plan that provides 24\/7\/365 protection is key to ensuring proper defense.<\/p>\n<p>We encourage implementing a multi-layered protection, including Antivirus and Antimalware installed on every device, as well as other barriers like a properly configured firewall.<\/p>\n<p><span style=\"color: #800000;\"><strong>Employee Training &amp; Education<\/strong><\/span><\/p>\n<p>The most common reason for a security breach revolves around authorized users.\u00a0 <a href=\"https:\/\/tsisupport.com\/tsistaging\/avoid-getting-hooked-this-phishing-season\/\">Phishing<\/a> and <a href=\"https:\/\/tsisupport.com\/tsistaging\/what-to-do-during-a-ransomware-attack\/\">Ransomware<\/a> Attacks prey upon employees opening attachments or clicking on a link within the body of a message to gain access.<\/p>\n<p>Properly <a href=\"https:\/\/tsisupport.com\/tsistaging\/business-needs-wisp\/\">training and educating your staff<\/a>, as well as third-party vendors are a vital component to a more secure network.\u00a0 We offer these services, as well as real-world phishing security testing to see how susceptible your staff may be to clicking on malicious links\/attachments.<\/p>\n<p><span style=\"color: #800000;\"><strong>Maintain Network Updates &amp; Patches<\/strong><\/span><\/p>\n<p>The security industry works at nearly the speed of light just to keep up with the latest attacks being released.\u00a0 It is not uncommon to receive multiple updates in a single week.\u00a0 These patches and updates are important because there is an entire counter-industry working to locate vulnerabilities they can exploit.<\/p>\n<p>The constant updates can be a burdensome undertaking, which is why we include it in many of our <a href=\"https:\/\/tsisupport.com\/tsistaging\/it-services\/managed-services\/\">Managed Service<\/a> plans.<\/p>\n<p><span style=\"color: #800000;\"><strong>Strong Password Policies &amp; User Convenience<\/strong><\/span><\/p>\n<p>When nearly every device, program, and application requires some level of identify authentication to access, it is easy to make sacrifices in the name of convenience.\u00a0 We choose efficiency by having our browser store credentials, jot down access codes onto sticky notes, often left on our desk.<\/p>\n<p>An average person has 27 different logins they are expected to memorize. Further, each is expected to follow <a href=\"https:\/\/tsisupport.com\/tsistaging\/how-to-remember-your-passwords-and-keep-them-secure\/\">password best practices<\/a>, using unique credentials for each profile. The reality is we often utilize a single password for most. Sacrificing the protection of the network, as well as our own personal identity.<\/p>\n<p>We partnered with Passportal, a secure cloud-based password and identity management tool that allows one-click access to all your program, site, and application credentials. A solid solution to improve security and prevent user fatigue while gaining access.<\/p>\n<p><span style=\"color: #800000;\"><strong>Be Proactive<\/strong><\/span><\/p>\n<p>Most small businesses lack a proper IT department, staff, or specialist.\u00a0 Even in cases where someone is responsible for managing the IT for a small business, they are often working as the jack-of-all trades.\u00a0 The result is often a reactive approach, repairing problems as they arise, rather than monitoring your overall network health.<\/p>\n<p>A true IT solution involves a pool of talented individuals who can resolve any issue that arises, as well as prevent potential downtime.\u00a0 It is a costly and often unrealistic expectation for new businesses to absorb.<\/p>\n<p>It\u2019s why partnering with a trust managed service provider (MSP) like TSI makes sense.\u00a0 We can help bridge the gap between cost and proper network security.\u00a0 Delivering enterprise solutions which meet your needs and budget. To learn more, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.\u00a0 Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.\u00a0 It\u2019s why we decided&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8509,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[271,312,274,173,242,129,275,132,107,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Solutions | 5 Things Every Business Should Know | TSI<\/title>\n<meta name=\"description\" content=\"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Solutions | 5 Things Every Business Should Know | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2279\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-03T08:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279\",\"name\":\"Network Security Solutions | 5 Things Every Business Should Know | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png\",\"datePublished\":\"2017-01-03T08:00:04+00:00\",\"dateModified\":\"2021-07-07T09:15:47+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2279\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2279#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity tips: 5 Things Every Small Business Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Solutions | 5 Things Every Business Should Know | TSI","description":"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Network Security Solutions | 5 Things Every Business Should Know | TSI","og_description":"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2279","og_site_name":"TSI Support","article_published_time":"2017-01-03T08:00:04+00:00","article_modified_time":"2021-07-07T09:15:47+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2279","name":"Network Security Solutions | 5 Things Every Business Should Know | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png","datePublished":"2017-01-03T08:00:04+00:00","dateModified":"2021-07-07T09:15:47+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn five cybersecurity tips every small and medium business should know to ensure you network security strategies are effective.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2279"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/01\/Website-Header.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2279#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity tips: 5 Things Every Small Business Should Know"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2279"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2279"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8509"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}