shared tips on creating an IT Inventory for your business..
While doing the inventory, also consider whether strong password requirements are enforceable and Two-Factor Authentication (2FA) is enabled. (2FA is an additional layer of protection for your passwords.)
➡️ Create separate networks and restricting access rights (admin/user/none) so that sensitive information is harder to get to and key systems do not sit on the same network as less secure devices, potentially reducing the impact of an attack because:
???????? Many consumer IoT devices have no, or very minimal, built in security
???????? Older equipment may be out of warranty and no longer protected against new vulnerabilities
???????? Third parties with network access rights offer a route in for attackers
???????? If third parties do have access to your network, do they have a policy in place to enforce password changes when key personnel leave?
➡️ Make sure you keep your inventory updated on a regular basis, including whenever you add or delete new equipment, accounts, or critical data.
Have you implemented any password control in your business? Learn more here Cyber Security
#smallbusinesssupport #smallbusinessowners #itsupportservices