The Internet allows businesses of all sizes, and from any location, to reach new and larger markets but cyber-security should be an integral part of your strategy.

Our Security Measures for Small Businesses

Broadband and information technology are powerful tools for small businesses to reach new markets, increase productivity & efficiency.  However, with increased cyber attacks, businesses are adapting to a new age.  As your IT partner, we will develop a cyber-security strategy to protect your business, customers, and data from growing cyber-security threats such as ransomware & phishing. 

Steps we take to help our clients to create a security-aware environment:

1. Train our clients' employees in security principles

Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that may include detailing penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data.

2. 25% of Phishing Emails Get Past Office 365 Default Security

A new report from cloud security firm Avanan found that one-quarter of all phishing emails bypass the default security settings of Microsoft Office 365, including malicious links.  To combat phishing attacks, we provide employee training to find out what percentage of your employees are Phish-prone with a phishing security test. Employers see how they stack up against their peers with the new phishing Industry Benchmarks!  We realize that simulated phishing tests are urgently needed as an additional security layer. Today, phishing users is just as important as having antivirus and a firewall.  It is an effective cybersecurity best practice to patch your last line of defense: Your users.

2. Protect information, computers, and networks from cyber attacks

We make sure that machines are clean by having the latest security software, web browser, and operating systems.  It is the best defenses against viruses, malware, and other online threats. We set antivirus software to run a scan after each update & install other key software updates as soon as they are available.

3. Provide firewall security for your Internet connection

A firewall is a set of related programs that prevent outsiders from accessing data on a private network. We make sure the operating system's firewall is enabled or install free firewall software available online. If employees work from home, we make sure that their home system(s) are protected by a firewall and they connect via VPN, a secure connection.

4. Creating a secure mobile device action plan

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Upon consent of our client(s), we require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. We also make sure to set reporting procedures for lost or stolen equipment.

5. Make backup copies of important business data and information

We regularly backup the data on all servers & computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. We backup data automatically once, or multiple times, daily on & offsite/Cloud, to ensure protection of data.

6. Control physical access to your computers and create user accounts for each employee

We prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so we recommend locking them up when unattended. We create a separate user account for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel.

7. Secure your Wi-Fi networks

If you have a Wi-Fi network for your workplace, we make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, we set up your wireless access point or router, so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protected is required to access the router.

8. Employ best practices on payment cards (PCI Compliance)

We work with our clients' banks or processors to ensure the most trusted and validated tools and anti-fraud services are being used. Our clients may also have additional security obligations, such as PCI compliance, pursuant to agreements with your bank or processor. We isolate payment systems from other, less secure programs and don't use the same computer to process payments and surf the Internet.

9. Limit employee access to data and information, limit authority to install software

We restrict employee access to data systems that they need for their jobs, and should not be able to install any software without permission.

10. Passwords and authentication

Our clients decide upon their password preference - but we recommend our clients' employees use unique passwords and change passwords every three months. We also recommend implementing multi-factor authentication that requires additional information beyond a password to gain entry. 

We can help you have a some secure environment to protect against malware & ransomware.

Call us for more information!

Family Owned & Operated Since 1994. 

In a Crowded Field, Longevity Counts.

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Thank you for considering inSync as your IT Partner.

We appreciate the opportunity to present our unique model for IT Support & Services.

Flexible Contract Terms.  Professional Engineers.  Customized Support.

Email:  Karen Bessette

Corporate:  (949) 837-5000​

Contact Us

inSync Computer Solutions

Corporate Headquarters:

23272 Mill Creek Drive, Suite 110  Laguna Hills, California  92653