Cloud based systems like Office 365 and Google are prime targets for bad guys

Why? Because humans are predictable! 

  1. We typically re-use the same passwords across multiple sites.  So if LinkedIn gets breached, then the bad guys can quickly use those same passwords to log into Office 365. 
  2. We are curious – and we want to help. If you get an email from a colleague asking to collaborate on a file or to help with a payment, we typically take action without confirming that the request is legitimate.   
  3. The bad guys use these tactics to help steal your log in information – which can then be used to siphon money and data out of your company. 

Know Your Risks With Our Security Report Card

Our expert security team can deliver a 5-point full report that will show you exactly where your security and data management is lacking.

Your custom report will cover: 

    1. Administrative Controls
    2. Security Controls
    3. Technical Controls
    4. Tenant Best Practices
    5. Licensing and Usage

These security reports are custom-made for each company. We don't believe that security and data management is a one-size-fits-all or cookie-cutter solution. We work with you to leverage technology to bring your business the most benefits. 

Security Report Card Final

Here are 7 simple and free things you can do to help mitigate your data risks. 

  1. Set up a wire transfer policy that requires voice confirmation before a wire is executed or approved.
  2. Set up a custom log in page for Office 365 or Google that helps the employee quickly identify that the page they are logging into is really your company page. 
  3. Review your Admins (in Office 365 they are called Global Admins).  If you have any end users that are using their day to day account as a Global Admin, set up a separate account (such as that is used for administrative activities.  This can protect your tenant in case the employee’s email gets compromised. (Global Admins don’t have to have licenses assigned, so this is free!) 
  4. While you are at it, set up MFA for your Global Admins.  Consider setting it up for all users (recommended!).  There are free and paid options. 
  5. Remind your staff, frequently, that security starts with them and they should think twice before clicking that link or authorizing that wire. 
  6. Have your insurance provider review your coverage for cyber security and social engineering fraud coverage. 
  7. Check the dark web to see if your account has been compromised in a data breach. 

Want more of the latest and greatest cybersecurity best practices? 

Download Guide Now