logo Client Portal logo +61 3 90705606
ITH Publication - October 28, 2020, 11:34 pm


EndPoint Security - Is your system secure?

As an IT Support Manager or a business owner you must have always asked this question to yourself, "are our systems secure "? As a Managed IT service provider/IT Consulting firm we always recommend you review the security of your end users’ devices include desktop/laptops. These endpoints are the point of interaction of all users with internal/external facing systems and act as a gateway to your digital systems.

 

In the current scenario of a pandemic where work from home has become a norm, below are some of the questions that you need to address before being assured about the security of endpoints and ultimately your data/business systems.

  • Have you prevented end-users from having administrator access on laptops/Desktops?

 

  • Do you have Anti-virus installed on all laptops?

 

  • Is Two factor authentication configured on all your critical business systems including email systems (Exchange/Office365) whilst they are being accessed from users computers?

 

  • Do you have an email security filter to ensure that ransomware/malicious emails are being filtered out?

 

  • Do you have a web browsing policy/filter to prevent users from surfing potentially harmful sites?

 

  • How do you manage app installations/what a user can or cannot run on their computers?

 

  • Is there a proper access control policy/mechanism for applications and business systems?

 

  • Do you have policies that prevent access to business apps including emails/OneDrive/SharePoint/Slack/Practice Management Systems from outside company laptops/desktops?

 

  • Are you disabling USB ports on your laptops/Desktops?

 

  • Do you have a password repository that allows users to easily collaborate by using shared passwords?

 

  • In case a laptop is stolen or compromised, does your IT Team have the capacity to remotely wipe the devices?

 

  • Do you patch your devices regularly?

 

  • Do you have a training program for your staff on IT security awareness?

 

  • Do you regularly backup your systems and data?

 

  • Do you regularly recycle user and system passwords?

 

If your answer to the above questions is yes, you have significantly minimized the risk of your overall systems being compromised. These are the fundamentals of securing any business systems and it is highly recommended that you implement these to ensure the safety of your systems. However, depending on the industry, business, the type of systems and the end-users requirement there might be additional security requirements to ensure compliance and safety of business critical data.

If you require any assistance with IT security feel free to reach out to us by emailing at [email protected]



Click here to fill out our contact form.
OR Click here to send an email to IT Horizon.