The new year tends to bring resolutions, reflections, and if you’re in business, a time to really examine if the systems and providers you’re utilizing are doing the most for your business. We’ve put together a few key questions to ask your IT provider (or if you don’t have one, things to ask potential candidates) to ensure that you’re getting the best service for your buck.

 

1. What’s your endpoint security strategy?

Endpoint security involves securing devices that end-users (employees) utilize, so things like laptops, mobile devices, and PCs. Without it, every individual device becomes an additional access point for threats to enter your business and steal information from your network.

 

Surprisingly, many IT providers don’t offer this to their customers. In fact, only 43% surveyed in this year’s Security Review sold endpoint solutions. 55% didn’t even know how to answer the question.

 

Technology changes quickly, as do security threats. So not only must your IT provider have an endpoint solution, but it needs to be one that evolves over time. If they use the same solution as they have a few years prior, there’s an indicator that your IT provider isn’t staying up with the times. And in this industry, you can’t afford not to keep up with technological advances.

 

2. What third-party email security solutions do you leverage?

“90% of advanced threats originate through email,” according to the Trend Micro Security Survey 2018 whitepaper. While Office365 is a better email system than its predecessors, relying on its built-in security system is unwise. Your company needs additional protection to thwart attacks from cybercriminals. Your business uses email every day to complete job functions. Don’t leave it to chance – close the email security gap with an IT provider who understands the importance of safety.

 

3. Do you have a backup and recovery system?

Cliché as it is, disaster tends to strike when you least expect and are least prepared. One of our clients experienced this first-hand. Luckily, our IT team had a plan in place, and we were able to get them back to full operations in just 10 days. Make sure your IT provider can do that for you if a crisis emerges.

 

4. What’s your approach to cloud security?

The cloud is no longer just a place for your iPhone photos, and it’s important to have trustworthy security measures in place there, too. Ask your provider how they vet their cloud programs and what kind of security is in place.

 

5. Do you have resources for small businesses?

If you’re using a break-fix model, which we don’t recommend, you’ll want to see if there are ways for you to leverage resources that won’t cost you every time there’s a minor issue. If you go the managed services route, see if there are any additional training your team needs that will help your employees utilize best practices while online. Often times, it’s human error that causes the largest IT headaches.

 

Unsure Where to Start?

A good place for any business is uncovering gaps in security. This can be done through a Vulnerability Scan that scours your entire network for potential weaknesses that hackers target. Vulnerability scans can also examine areas where you might unknowingly be violating Regulatory Compliance. If you’re unsure where you fall under Regulatory Compliance, we recommend filling out our questionnaire.

 

Determine Your Compliance Responsibilities

 


 

Subscribe to our blog