Point of View

Let's Talk Cybersecurity


Point of View – October 2021

October is Cyber Security Awareness Month (CSAM) and the theme for this year, “Life Happens Online,” could not be more fitting.

Life has happened online for a year and a half now. From migrations to mergers, the internet has made working in a pandemic possible.

But with the benefits and conveniences of internet dependent tools (re: cloud technology), there comes both minor and major security risks.

Staying in the loop on cybercrime is essential to protecting your company data and communications. Yet only 38% of Canadian SMBs deeply embed cyber security into all aspects of their business (KPMG Canada).

Because we believe awareness is key, we’ll covering a few tips and tools to securely keep your business on track.

Why Cyber Security Matters

The most common reason behind cybercrime is pursuit of information. The top 3 targets are personal information, banking information, and company or business data (CSE Canada).

Let’s take a closer look at that last reason.

One of the most common reasons behind cybercrime is acquiring valuable, but private, company data.

Why? Because companies often contain assets with high monetary value.

But large corporations are not the only target of cybercrimes. Since the pandemic was declared in March 2020, approximately 25% of small businesses in Canada were targeted by cyberattacks (Wealth Professional).

In fact, the pandemic has led to:

  • Increased security risk from remote working
  • Delayed cyber-attack detection and response
  • Gaps in physical and information security
  • An influx of cybercriminals
(Deloitte)

The consequences of cyber security threats can’t be ignored: by the end of 2021, cybercrime is expected to cost the world 6 trillion USD.

(Cybersecurity Ventures)

These findings make it clear that cyber security threats are very real and very costly for your business. So how do you create an airtight loss prevention system?

We uncover 3 simple tips below that can be applied whether your business is small or large.

3 Ways to Secure Your Communications

#1: Outsource your resources 

61% of cybersecurity teams believe their teams are understaffed. Bridge the gap and outsource cybersecurity resources that will save money in the long run.

This is an excellent option especially if…

  • An issue falls out of the scope of your IT team.
  • Your company doesn’t have an IT team or is understaffed.
  • An issue is time sensitive and requires an extra set of hands.

Many consulting firms will offer cost and time efficient security measures with low upkeep. These could include a variety of solutions, from device management to assessments of your current assets (more on that in the next article).

Want to outsource with Point Alliance? Click here.

#2: Be proactive, not reactive

With the right tools, staying proactive shouldn’t cost your organization extra. The right tools will automate security updates and proactively search for potential threats and breaches.

Microsoft Endpoint Manager is the perfect example of a proactive tool. Automated updates and AI powered analytics keep you on track for secure communications and file sharing.

Even the tools you currently have can do more than you think. Getting a tenant assessment can reveal new ways to leverage your tools.

#3: Update, update, update

Updating is just a way of being proactive but merits its own explanation. 42% of Canadians only update their devices when it’s convenient (CSE Canada).

It is important to remember that updates are not created just to access new features. Updates often carry new security measures that address gaps and loopholes hackers might find in an operating system.

Make sure you and your colleagues (or employees) don’t update devices merely out of convenience. Automate updates where you can and, regardless of whether updates are automated or not, routinely check the security reports of accounts, software, and devices.

Secure Your Assets

As cybercrime increases, so does the output of cyber security tools and measures that address evolving threats.

It is crucial for organizations to routinely check the security of devices and accounts to avoid leaving gaps for attacks.

Regardless of company size, leaders and IT members of an organization must be proactive. A tenant assessment is a comprehensive and time efficient way to assess your assets.

By letting experts assess their devices and applications, organizations can uncover and mitigate crucial gaps in cybersecurity.

Small and medium sized businesses (SMBs) often don’t have the luxury to constantly monitor these changes. Tenant assessments are an ideal option for SMBs as they are cost and time efficient.

How We Assess Security

Our team of experts work with you to leverage the Microsoft 365 Security Center. At the core of our process is reviewing essential security questions such as…

  1. Are users configured with multi-factor authentication?
  2. If the organization’s on-prem Active Directory is synchronized with Azure Active Directory, are only necessary objects synchronized?
  3. Is the number of users configured as administrators in Microsoft 365 appropriate for the size of the organization?
  4. Are dedicated administrative accounts used?
  5. Are Azure AD User Settings configured from non-default settings?
GET ASSESSED BY POINT ALLIANCE

Secure Your Management

Device security starts with the right management tools. Microsoft Endpoint Manager is a proactive platform powered by AI analytics that routinely check device vulnerability.

Security features can be managed through the Endpoint Admin Center and built in AI analytics power automated security updates. Additionally, should you opt for cloud device management, you can benefit from the security features of Microsoft Azure.

Curious about Microsoft Endpoint Manager? Our Endpoint newsletter covers more on the powerhouse platform. To request a demo or discover our process, click the link below.

LEARN MORE ABOUT SECURE MANAGEMENT