IT Support for New Brunswick Small and Mid-sized Businesses

NetAdmins provides enterprise-class IT services & tech support to New Brunswick, Nova Scotia and PEI small and mid-sized businesses. We manage every part of your IT, so you can focus on what you do best—running your business.

Partnering with NetAdmins is like having an entire IT support department at your disposal, whenever you need it. With a range of services including IP telephony (VoIP), email and web hosting, data back ups, paperless document management, security audits and 24-hour IT helpdesk, New Brunswick businesses can count on us as their only stop for business IT solutions.

On top of our à la carte offerings, we also provide comprehensive Managed IT Services in New Brunswick, Nova Scotia & PEI—including unlimited onsite and remote IT support, so you have a constant hedge against IT disasters. Our skilled computer technicians in New Brunswick maintain your business IT systems, keeping them in top shape, and minimizing downtime.

We make sure your managed IT services in New Brunswick are stronger and more secure so your users can be more productive and focused on your core business—always at a savings to your bottom line.

Contact us today to learn more about our Managed IT Service plans or our range of expert IT and communication services.

Addressing cyberattack threats, breach points, policies, company readiness, and recovery.

Cyber Attacks

When we asked businesses about cybersecurity threats, breach points, policies, company readiness, and recovery, we were surprised at the responses that we received. The most frightening response of all was the following:

“We have no formal process for assessing readiness to deal with a cyber attack of any sort.”

Hindsight is always 20/20 – how many times has something happened that you could have and should have prevented? There are five questions every company should ask themselves, at least twice a year:

  1. What are our current cybersecurity threats?
  2. What are common breach points within our company?
  3. What are our current cybersecurity policies?
  4. What is our company’s readiness for a cyber attack?
  5. What are our recovery policies in response to a cyber attack?

Cybersecurity Threats

It’s easy to sit back and think that threats and attacks only happen to other people and other businesses, but not to ourselves. Living in a state of paranoia can be beneficial to the security of your company. Former Intel CEO, Andrew Grove, once stated that “Only the paranoid survive”. Knowing all you can about current and possible future attacks helps you to understand why and how you need to be prepared.

With 2 million new malware attacks launching every day, we need to be constantly alert. Recent examples of extremely dangerous cyber threats are the Meltdown and Spectre bugs, which allow potential attackers to access to private data. Forbes magazine reports that the five cyber threats to look out for in 2018 are ransomware attacks, crypto jacking, education and healthcare cybercriminals, and malware attacks.

Cyberattack Sources Of Breaches

Cyber attacks could threaten your business through a few different sources. For example, employee mobile devices make up for 51% of all cybersecurity breaches, which is extremely troubling, given that there are nearly as many employee cell phones as there are employees themselves. Another possible source of a breach is Internet of Things devices. Together they make up 87% of all the cybersecurity breaches.

Cybersecurity Policies

Cybersecurity policies should be in place to ensure that the company as a whole is all in agreement on what the threats are, how to avoid them, and how to respond to one. Employees should be trained to know how to report a possible cyber attack, as well as how to prevent one.

For example, employees should be taught to always look for e-mails that are suspicious, such as those that include simple grammar mistakes or excessive punctuation. Employees should have policies in place such as how to flag or report a suspicious e-mail. Additionally, employees should all be trained on the importance of avoiding opening or clicking on suspicious e-mails or links. Spectre and Meltdown use these emails as vehicles to reach your prized data. If you limit their transportation, you’ll better protect your data.

Cyber Security Attack Readiness

To check your business for its readiness to handle a cyber attack you should see which of the four main categories your company falls into. Is your organization’s readiness passive, reactive, proactive, or progressive? Passive means that your business is not prepared for a cyber attack – you just hope that it won’t happen. Reactive means that while you aren’t ready to protect against a cyber attack, your business is prepared to react to one. Thirdly, your business is proactive if you are prepared to respond, while also seeking to avoid future attacks. Lastly, your company is progressive if it has deep cyber attack prevention, protection, and reactive capabilities in place.

Recovery From Cyberattacks

Once a cyber attack has occurred, you need to have a policy in place to immediately begin recovery. Cyber attacks have four main effects. In the aftermath, most businesses will see a reduction in their operational abilities, downtime, reputation, and revenue. After a cyber attack, 39% of companies reported a decrease in operational capability as their leading complaint. Downtime came in second with 37% of businesses reporting it as the primary effect on their company. Effects on the operation, and downtime, ultimately result in lost profits. It’s reported that 44% of companies estimate that they could lose over $10,000 within just one hour of downtime.

To protect your business, you need to look at the problem from all sides. Ensure that you and your staff are well trained, and remain vigilant against any cyber attack that could affect your company. Have policies in place, to ensure that staff is proactively working to protect the business’ data, staff, and clients. Should a cyber attack occur, your business should be ready to not only combat it but also recover from it?


Comments are closed.