IT Support for Small Business Owners: 20 Quick Tips
Small businesses face an ever-growing array of technological challenges. From cybersecurity threats to operational efficiency, the need for IT support has never been more critical. This guide offers 20 tips to help small business owners navigate the complex world of information technology, ensuring their operations remain secure, efficient, and competitive.
It’s important to recognize that effective IT support for small business goes beyond simply troubleshooting technical issues. It encompasses a holistic approach to managing your business’s digital infrastructure, from safeguarding sensitive data to optimizing workflows and empowering employees. By implementing these tips, you’ll be better equipped to harness the full potential of technology while mitigating risks and maximizing productivity.
Keep in mind that the goal is not just to react to IT challenges as they arise, but to proactively build a resilient and adaptive technological foundation for your business. Whether you’re a tech-savvy entrepreneur or someone who finds the world of IT daunting, these insights will provide you with actionable strategies to enhance your business’s technological capabilities.
1. Multi-Factor Authentication
MFA is usually implemented via your mobile device which receives a confirmation code via text or authentication app. This code then needs to be entered when prompted to by the account being logged into. By adding a second layer of login confirmation, a stolen password alone will no longer allow thieves to access your account.
MFA is also recommended for any cloud based logins that you may utilize. Most banking institutions have integrated multi-factor authentication as well as cloud ERP and CRM platforms among others.
The implementation of MFA can be for an individual basis or company wide. To ensure maximum protection, we recommend making this mandatory for all staff and all software considered a security risk.
2. Public WiFi Vs. Private Hot Spot
Because public WiFi is inherently risky, your personal hot spot is a far safer alternative. However, in cases where you simply have to connect to an unsecured public access point, practice good Internet hygiene. Avoid sensitive activities that require passwords or credit cards (e.g., banking, online shopping.)
Before connecting to any public wireless network such as those offered in coffee shops, airports or hotels, confirm the following information with an employee of the facility:
- The network is legitimate
- The exact spelling of the WiFi network (SSID)
- The correct login info
3. Avoid Unsecured Websites
There are some quick things to look for when determining whether a site you are browsing is safe or not. SSL certification is the security standard for websites, it ensures that traffic between your browser and a website is encrypted.
To ensure the sites you are visiting are SSL certified:
- Look for the Lock: The icon of a closed lock in the address field of your web browser ensures the site you are visiting is currently SSL certified.
- Look for https:// : A web address (URL) should begin with “https://” (instead of http://), especially when online shopping or banking. Remember, the “S” is for secure!
Encryption is key to your data security as any information communicated to a website passes back and forth through the world wide web before reaching your intended destination. During this journey, bad actors can access your credit card numbers, usernames, passwords, and other sensitive information if not encrypted. When SSL is used, the information is encrypted so that it cannot be accessible by anyone other than the destination you are sending the information to.
4. Password Creation: Best Practices
From mobile devices and email, to bank accounts and business software, a password is the initial security measure for your data. Anything worth protecting deserves a password that is difficult to crack. Best practices for password creation change as new information becomes available. The National Institute of Standards and Technology (NIST) offers updated password guidelines in accordance with new research.
Follow these steps when creating passwords:
- Let a password manager do the heavy lifting: These applications are a great option to securely contain all your complex login information. By remembering one master password, you have access to create as many complex passwords as you need.
- Keep your passwords to yourself: Sharing passwords or placing them in obvious places, such as taped to the bottom of your keyboard, slowly chips away at your security by opening more and more possibilities for theft or misuse.
- Avoid common or easily guessed passwords: “Password123” or “123456789”, etc.
- Incorporate special characters into your passwords: @,#,$,%, etc.
- Long passwords are your friend: The longer the better! Consider creating a long passphrase instead, such as the title of your favorite book or a movie quote. Remember to mix in capitalization and punctuation.
5. Have a Backup Plan for Your E-mail
Many business owners assume their cloud accounts are automatically backed up and guaranteed against data loss, surprisingly, this is not always the case. While Microsoft, for instance, guarantees that their platform is accessible and functional, they provide no such guarantee of data retention.
We all understand how important e-mail is for maintaining personal, internal and client communications. Depending on your industry, maintaining a historical archive of e-mail communication is sometimes legally required for 5-10 years in case of future litigation. Preventing catastrophic loss of data with an automated e-mail backup solution is an inexpensive way to protect your business.
6. Securing Your WiFi
Maintaining control of Wi-Fi access while creating layers of protection between devices is key to network security. With the push towards remote work, these security measures should be followed at home as well.
Steps to help secure your Wi-Fi:
- Change the default router password, ideally during the initial setup.
- Ensure password protection is using the WPA2 or newer protocol.
- Change the Wi-Fi password regularly.
- Create separate Wi-Fi networks for added security.
- Staff SSID/Network: For business-specific devices.
- IoT SSID/Network: For unsecured Internet of Things devices.
- Guest SSID/Network: For visitors and mobile devices.
For strict security measures:
- Turn off SSID broadcasting to hide your network. Users must manually enter the name (SSID) along with the password when first connecting.
- Each internet-capable device has a network adapter with a unique MAC Address. Set your router to allow only devices with specific MAC addresses to access the network.
7. E-mail Phishing Awareness
E-mail phishing attacks are the number one source for data breaches. Phishing uses official-looking email to trick recipients into taking actions that expose sensitive data. Some provide links to fraudulent sites that request login credentials, others include attachments that unleash malicious code when opened.
Check for these signs of a phishing email:
- Intimidation and threats.
- Unrealistic or urgent demands.
- Poor spelling and grammar.
- Slight variants to a known address (such as gooogle.com)
- Links to websites requesting login information.
- Requests for sensitive information.
- Unexpected attachments, especially those labeled as invoices, tracking info, etc.
Stay vigilant and take these proactive steps when suspicious of email content:
- Check the spelling of the sender address for obvious fraud.
- Never open unexpected attachments.
- Never follow a link from an e-mail. Use a search engine to locate the official site directly.
- When in doubt, call the sender to verify the legitimacy of the email.
- Set up spam filtration.
8. Internet of Things (IoT) Device Security
The Internet of Things (IoT) revolution is in full swing. Business and home networks frequently include smart TVs, thermostats, refrigerators, door bells and video monitors. These IoT devices are not nearly as focused on security as they need to be when living on the same network as your computer, mobile device and, with the trend towards remote work, access to your business computer.
To shore up security holes in your environment, enterprise routers and most home routers will allow you to create multiple networks with unique names/SSIDs to keep your valuable information from exposure to unsecured devices. Place your IoT devices on one SSID, your home PCs on a second, and if able, your business devices on a third.
9. Implement a Patching and Update Process
Update software and firmware regularly to improve functionality and close newly discovered security holes. Implementing a well-designed patch management system minimizes potential impacts to the workflow of your business.
Review these patch management steps with your IT team:
- Inventory your equipment and track which are currently patched and which are pending.
- Identify and prioritize patches that resolve major vulnerabilities.
- Set a monthly schedule for patching to plan for any potential outages during updates.
- Create a change management process to plan for patching issues that could affect business.
- Ensure critical systems are backed up.
- Have a roll-back strategy which places infrastructure back into a pre-update state.
- Patch a test machine first before rolling out any company wide updates.
- After testing patches, roll the updates out to larger groups of machines.
10. The Benefits of a Fail-Over Internet Circuit
The Internet has become the backbone of modern business with the push towards cloud technology and VoIP taking communication where analog phones could only dream. In the old days, when your internet access was down, customers could still call to get through on your analog phone system. Now however, if your VoIP shares the same Internet service provider as your business, one outage can take your entire system offline.
If your business depends on constant communication with customers and staff, consider implementing a fail over internet circuit which takes over when your primary circuit goes down. The fail-over circuit should be purchased from a different internet service provider than your primary circuit. This ensures that if an outage occurs with one provider, the other provider is most likely unaffected.
Plan ahead, avoiding one serious outage can often cover the cost of the extra circuit by eliminating the associated downtime while ensuring your customers have a seamless experience.
11. Business Continuity and Disaster Recovery
IT technicians have been beating the “back up your data!” drum for decades, but not all backup solutions were created equal. External hard drives and NAS setups won’t cut it during a severe security breach. Consider unknowingly backing up malware infected data. Recovering data that is also infected is crippling for a business. Without a clean older version of a backup, it could potentially lead to total data loss. As a response to these concerns, Business Continuity and Disaster Recovery (BCDR) planning was developed.
Uptime for any business is critical. A well-executed BCDR plan backs up your environment as well as your data. When only backing up files, it can take days for larger businesses to recover data into a usable state. BCDR solutions can provide working replicas of your environment and data within minutes while also maintaining multiple versions of historical backup states to mitigate the effects of corrupted, infected or encrypted data. Avoid the cost and stress of downtime protect your business with a BCDR plan.
12. Change Default Passwords of All Devices
One of the first things cyber-criminals will check when trying to access your data is whether you have left a default username and password in place within your network infrastructure. It’s an open door to your data. These default logins are readily available on manufacturer’s websites and user manuals for any hacker to find and use.
Consult with your IT team to ensure that your entire infrastructure is configured with complex non-default passwords. This is also true for home networking devices such as routers and modems which are frequently installed by the homeowner as opposed to a professional technician. With business owners and staff working remote more frequently, it is critical to ensure your home network is secured as well.
13. Choosing Antivirus Software
Cybercrime is a growth industry, the number of attacks and costs of recovery trend upward each year. Because of these realities, implementing antivirus (AV) protection is as important as it has ever been.
AV tools fall into three primary tiers; free versions, paid consumer versions, and enterprise grade versions. Free and consumer grade AV tend to be bloated with unwanted “extras” that slow your computer down significantly. They also include frequent popup messages urging you to pay for add-on features that can be confusing for staff. Windows already offers the built-in AV “Defender” which generally works as well as any baseline consumer version on the market (and no, Macs are not immune to viruses.)
Businesses require, secure, effective, and efficient tools. Enterprise AV solutions offer a nimble, streamlined experience. The advanced security measures such as cloud-based, AI enabled behavior analysis, and professionally monitored AV support eliminate the need for end users to manually handle virus alerts.
14. Have a Cyber Breach Action Plan
Planning for a security breach is like planning for a natural disaster. They may never come, but when they do, having a plan in place can have a tremendous effect on how well you and your business will weather the storm.
Work with your IT team to ensure there is a plan of action for each type of security breach. The examples below happen to businesses every day. Without proper planning, some of them can be ruinous, and each requires its own approach to be dealt with properly.
Think about what steps your team will need to take for the following scenarios:
- An e-mail account is breached and currently sending spam to clients.
- An e-mail account is breached and client data has been compromised.
- Your internal network is breached and data has been compromised.
- Your workstations have been infected with ransomware, locking up all your data.
- Your website has been brought down from a distributed denial of service attack
- A bad actor has penetrated your cloud ERP platform that is being hosted by a 3rd party.
15. Managing End-of-Life Dates for Infrastructure
All good things must come to an end. For better or for worse, evolving product lines usually require that support for old software and hardware is eventually phased out. The cost of supporting past products endlessly is cost prohibitive and sometimes impossible for manufacturers and software developers. With the end of support comes the end of security patches. Any new security holes discovered are left open and fixes are no longer created for bugs or errors.
Every business owner will come to a point where they must bite the bullet and pay to upgrade aging infrastructure. Fortunately, most companies in the technology space will publish “End of Life” notices online. Ensure your IT team is keeping track of these dates to ensure proper budget forecasting. Prepare to replace equipment before it reaches its end of life date. Unsupported legacy equipment can be rendered non-functional when connected devices go through driver, software or operating system updates. This type of surprise can be crippling so plan accordingly.
16. Securing Remote Connections with VPN
While remote connectivity to the office has become the norm, connecting safely is still an afterthought for many businesses. Using tools like Remote Desktop requires open ports in your firewall which create security holes exposing your network to a variety of attacks.
A secure solution for remote work is created by implementing a Virtual Private Network (VPN) for remote staff. A VPN provides private encrypted tunnels, from anywhere staff may be working, directly to your office network. Ports are closed to the cyber-criminals and all data transmitted back and forth is rendered unreadable by the encryption during its journey. It’s relatively painless to configure, easy to use, and inexpensive well!
Once connected to the network, staff can access the onsite tools as if they were using a computer in the office. They can access files as their normal permissions allow. Transfer files back and forth between their computer and the server and print documents to the office printers.
17. Schedule a Network Security Assessment
As your business grows and new staff is hired, computers and mobile devices are added to the network as well as the additional infrastructure to support them. A network security assessment shines a light on the blind spots that may be building up over time.
Tracking down and fixing weak points in the network is critical to protecting your environment or blind spots quickly become security holes. Once security issues are resolved, bottlenecks are eliminated to fix any network speed issues impacting productivity. Finally, budgeting becomes more streamlined as the assessment report highlights aging or failing equipment due for replacement.
Take These Steps Toward a Successful Technology Road-map:
- Determine what is connected to your network.
- Secure Your network.
- Track down bottle necks in your network.
- Resolve performance issues.
- Minimize downtime associated with the failure of aging equipment.
- Utilize aging reports for effective budgeting with insight into the state of your equipment.
- Develop a strategic road-map to guide IT decisions.
18. Enterprise Firewalls for Businesses Networks
The role of a firewall is to block undesirable traffic from entering or exiting your network. Every website visited, search engine queried, file transferred, e-mail sent or received, and video streamed is checked for threats by your firewall. This checkpoint is designed to ensure that all traffic follows the rules and meets the desired security criteria in order to continue to its destination. If the data does not comply, it is stopped at the gate and denied entry or exit.
Enterprise firewalls offer granular configuration to detect and block more, advanced attacks and intrusions. The firewalls that come with a home router are simply not able to offer the same level of protection.
Enterprise firewall functionality includes:
- Content filtering
- Application-specific attack detection
- SSL inspection
- Reputation-based filtering for Malware
- Geo-location specific traffic blocking
- Monitoring and alerts for application behavior
- Active directory integration
19. Staff Training is Key to Business Cybersecurity
Businesses are complex and dynamic systems. The staff within an organization and the customers being served are at the core, followed closely by the supporting infrastructure. When developing security strategies, infrastructure tends to receive all the attention, but it’s the people that are usually the primary target. Phishing and social engineering are among the most common and effective methods of attack. For them to be successful, each method depends on a human being letting their guard down.
Securing infrastructure is critical, but your staff also needs training on how to spot and avoid cyberattacks. For industries such as finance, businesses can benefit from educating clients as well. Inform your clients what types of communication to expect from you and how to detect fraudulent email, such as requests to wire money during a transaction. Ask your IT team to provide regular training for staff and to develop a security protocol for your clients. You’ll never regret protecting your people.
20. Use a Trusted IT Support for Small Business Partner
Business technology is more than just the computers and hardware we rely on daily. It is the knowledge, focus, and drive that pushes us towards more secure, effective, and efficient forms of communication, automation and information management. It is created, nurtured, and utilized by people, and its evolution is constant if not exponential.
Whether you are looking to protect your data and environment, streamline collaboration and communication, or implement tools that accelerate growth, it requires a dedicated technology team. As with anything in life, you need to surround yourself with the right people to help achieve the goals you are working towards.
PTS has been a trusted, local provider of IT support for small business for over 20-years. We will set your business up with the strategic support and security necessary to compete at the highest level. Contact PTS today to learn how we can help your business succeed.