Now more than ever your employees are working on personal devices. A recent Microsoft study reported that 67% of people use personal devices in the workplace. Tasks such as sending emails, reviewing documents, accessing applications, and other business productivity actions are performed on personal devices daily. Employees work on their own devices as a matter of convenience and, for the business, the productivity benefits are appealing. Be informed about the benefits and risks of this growing trend, and learn how you can manage and secure your sensitive company data.
As a business leader, keeping your sensitive company data secure is a top priority. As your organization adds more security controls, access to applications may have become more cumbersome. You and your staff are required to sign-in to multiple systems daily, each has its own set of credentials (usernames and passwords) and authentication methods. It's easy to lose track of credentials, and IT administrators are getting bogged down with password resets in addition to applying security policy enforcement within each of the various applications.
Has your small and medium-sized business (SMB) moved to the cloud, but not enabled Multi-Factor Authentication (MFA)? This tool is a proven game-changer for data security in the fast-growing shift to remote work. So why do statistics show that enforcing MFA within organizations is very low? MFA is part of your cloud services and simply needs to be enabled and enforced to provide secure end-user access to your corporate data. Here is a look at some revealing statistics that show just how important enabling MFA has become to keep the cybercriminals out of your network.
For years now, multi-factor authentication (MFA) has been at the top of cybersecurity best practice lists. MFA has proven to curb data breaches due to compromised credentials (usernames and passwords). According to Microsoft, 99.9% of cyber-attacks on company accounts are preventable with properly deployed MFA. This is a statistic no business leader can afford to ignore.
For many businesses today, the programs and applications used to increase productivity, reduce risk, and control costs are evolving faster than adoption strategies can occur. When this happens, productivity may decrease, while costs and risks may increase; the exact opposite of what they are trying to accomplish. Companies can avoid this situation by applying a forward-looking strategy around cloud adoption and implementation at their organization.
In 1970, around the same time David Bowie was writing “Changes”, Alvin and Heidi Toffler wrote a book entitled “Future Shock,” arguing that the ever-accelerating rate of technological and social change would create fear, confusion, and tension across the globe. In the last 50 years, their predictions have been largely prescient. While technology keeps getting better and has improved our lives in a myriad of ways, there is no doubt that it leaves some people’s heads spinning. What can you do? You can start by asking your IT partner for help.
You may recall from our previous blog post in October that Microsoft will replace the core terms of their customer agreement for all existing and new Microsoft customers after January 31, 2020. This new Microsoft Customer Agreement (MCA) is said to improve the purchase experience to better support all customers.
The time for Windows 7 has come and gone. As of January 2020, Microsoft stopped providing extended support for the popular operating system. While Extended Security Updates (ESU) are available for the Professional and Enterprise editions of Windows 7, this option comes at an increasing cost to organizations. It's critical to start planning your migration to Windows 10 now.
UPDATED SEPTEMBER 2020
Have you noticed consumer and business sites including mobile applications requiring multiple steps to verify who you are? Perhaps you’ve set-up a multi-step verification method to access your bank or Google email account? This security measure is growing in popularity as most data breaches today begin with a set of compromised credentials. From financial institutions to online stores to social media sites, many businesses are now requiring multiple factors of verification to ensure a user is who they say they are, reducing the chances of a cybercriminal successfully gaining access to their networks.
Today, your applications and files are no longer all contained within your four walls. Your staff may work from home or is on the move which means they are accessing your company's data and apps from multiple locations and on multiple devices. To keep your data secure, you need to know who is knocking at the door before you let them in. Your business might require complex passwords, but in reality, your staff is most likely using the same passwords across personal and business accounts, and the cybercriminals know it.