Our Blog

7 deadly security sins – Which are you guilty of?

BY IN Uncategorized Comments Off

Cyber security is quickly becoming a key point to address within your business IT strategy. It maybe the darker side of technology advancements and often people don’t want to talk about it, however the pain, lost time and often financial hardships need to be addressed.

In our world of IT the bad guys prey mostly on the naïve or lazy. Why do I say this – well the fact is the majority of victims leave the door open almost daring the bad guys to try something.

I would like to say this mostly happens to the uneducated or unlucky user however that does not always hold true. The honest truth being, not all people heed to the constant ever present warnings and prefer to do nothing thus exposing themselves and business to huge risk.

Are you exposed by any of these points?

1) Mobile Negligence

That flashy little device in your pocket is a big security risk. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your data limit in the process. Android devices are most vulnerable to threats however the Apple iPhone is still exposed.


  • Enforce secure passwords, block unwanted apps, and enable corporate email and Wi-Fi.
  • Reduce the risk of data breaches with remote wipe and anti-theft technologies.
  • Secure Android devices against mobile malware using an antivirus engine.
  • Engage with a specialist Managed Service provider to manage this for you

2) Mac Malice

Macs are gaining ground on Windows in corporate usage. However, many Macs aren’t properly protected against malware and data loss. Macs can be infected with malware just like PCs, and the threat is growing. Macs can also play host to Windows malware and spread it across your network to all your Windows computers.

Your employees love their Macs. But you can’t afford to give Macs a pass on protection.


  • Complete cross-platform protection, managed through a single console.
  • Enforce user-based policies that follow users across devices and platforms.
  • Secure Macs against the latest threats.
  • Utilise a Managed Service provider to secure all Windows, MACs and mobile devices through systemised processes and constantly apply the patch updates as required.

3) Unsecure Wi-Fi

Put an access point in your office and you’ll have a Wi-Fi hotspot in no time. Then along come all these devices that want to connect – smartphones and tablets belonging to your employees, laptops brought in by visitors. Do you know where those devices have been? And if your hotspot provides full access to your corporate network, that could mean access to more data than you intended. If you don’t protect your wireless network, it can open the door to threats.


  • Install secure wireless access points in seconds.
  • Enforce your standard network security policies across your wireless network.
  • Block undesirable websites and unsecure mobile devices.
  • Set up separate hotspots with different policies for different groups, with as much or as little network access as you want.
  • Take advantage of the knowledge and experience of a Managed Service provider

4) Un-encrypted Email

Your email typically traverses the Internet in plain text format. It’s like sending a postcard in the mail. Anyone with the means and motive – government agencies, ISPs, webmail providers, hackers, advertisers and even your competitors – can take advantage of this to steal sensitive data, facilitate identity theft, access credit card information, or provide more targeted advertising.

We’re in the middle of an email snooping epidemic and unsecure email is a major liability.


  • Combine DLP and policy-based email encryption in one easy to use solution.
  • Automatically detect sensitive information leaving your organization by email and either block or encrypt it.
  • Take data protection out of the hands of your employees and take care of it for them.
  • Allow a Managed Service partner to protect your privacy, confidentiality and integrity of sensitive emails.

5) Faulty Firewall

It may look like an unassuming box in the server room, but your firewall is your network’s first line of defence: blocking port scans, thwarting data-stealing malware, controlling Facebook access, prioritizing bandwidth for corporate applications … the list goes on.

If your firewall can’t keep up with threats and bandwidth demands, or is too complex to use effectively, you’re not getting the full potential from your network.


  • Put all the protection you need in place, simply and easily.
  • Enjoy lightning speed – get the right firewall for the job.
  • Gain visibility into what’s happening with extensive built-in reporting.
  • Secure against the latest threats with a trusted Managed Service partner.

6) Un-encrypted Files

Major corporations like Target, The Home Depot and JPMorgan Chase have suffered data breaches that are devastating to their brands.

Smaller companies suffer the same fate with less fanfare. No matter what the size of the breach, your reputation and customer loyalty can be damaged beyond repair. If you’re not securing sensitive company data and your customers’ identities, your customers will flee even if your business escapes the wrath of regulators.


  • Deploy the easiest, most reliable full-disk and file-level encryption available.
  • Protect data on multiple devices and operating systems, without slowing down your users.
  • Manage the native full-disk encryption in both Windows and OS X from one central console.
  • Utilise the skillset of a trusted Managed Service partner

7) Delinquent Web Filtering

Web filtering used to be easy – block out the pornography, gambling and extremist content and you’re safe. But today that’s no longer enough to keep employees secure against dangerous websites – 80% of all web malware is now hosted on legitimate websites that have been compromised.

Hackers compromise thousands of new sites every day, using sophisticated techniques to keep their malware from being detected. You can get infected with malware by browsing to a hacked website that might have been safe the day before, without even knowing it.


  • Keep out prohibited content with URL filtering with policy enforcement.
  • Catch the threats on the sites you’re allowing, scanning all content in real-time for malware before it reaches the browser.
  • Protect against advanced threats with technologies like JavaScript emulation to identify threats that get around traditional antivirus.
  • Partner with a specialist Managed Service IT provider.

Are you able to place a tick in the box for all the above? Can you confidently say your business is NOT exposed? Are you going to take action today or are you going to wait keep your fingers crossed and hope nothing happens to you?

If you are not 100% confident and not naïve or lazy then become proactive – Just give us a call today – at the very least you will understand the options.

For independent advice, please contact Tech Precision. We’ll help you relax.

I will leave you with this quote;

Think for yourselves, and let others enjoy the privilege to do so, too.”

– Voltaire,
philosopher and historian

Comments are closed.