Last week I told you that Aptica had made the decisive move to provide a Zero-Trust security platform for all of our customers. Zero-Trust means that even if malware gets to your network, the new platform will not allow it to attach to anything or to make changes to your network. We are notified that there is an issue, and that allows us to vet whatever caused the notification. You, the business owner, set the framework for what is and is not acceptable access to your precious data. Aptica deals with anything else that shows up. Aptica’s Zero-Trust platform has already proved its value.
We Got Some Good On The Job Training
We are pretty proud of our ability to protect data and to be honest, we were not expecting anything dramatic to happen with Zero-Trust right away. I’m remembering that adage, “Confidence is that feeling you have right before you know all the facts.”
This story has a happy ending, however. It was not bad actors who attacked our customers. It was Microsoft trying automatically to install one of its own patches. We had not programmed in permission for an operating system (Windows) to access data to implement a patch. While we didn’t have to send in the bomb squad to try to deconstruct something nasty, having this happen so quickly after our launch was a positive opportunity for us to deal with our new security protocols.
Prevention Is Still Our First Choice For Security
At this point in Aptica’s existence, we are old hands at system recovery. Our preference is to not have to go through any of that, though. A speedy recovery after a hack can get your business back up and running, but your losses will go for many months after the breach. Any personal information about your clients and any proprietary information about your business will be permanently stolen and sold, even if access to your system is restored to you. You may get your data back, but the bad guys have it too. You don’t get a ransom demand until after the invaders have copied all your data and fully mined that information. And paying a ransom will probably be only the first outlay of cash for you and your insurers. What can follow are lawsuits from other businesses and/or clients for damages caused by the breach. It makes my head hurt to contemplate those scenarios. I would rather spend my energy on weapons and tools to prevent such loss.
Be Suspicious. Be Sensible
It is a practical exercise to start each business day understanding that your enterprise could be randomly attacked. There are uncounted numbers of bad actors out there who spend their hours daily launching malware at businesses of all sizes and bank accounts. Even if you are small, some money is better than no money to hackers. At some time, some entity will attempt to break into your network and steal your data. There is no “maybe” about it anymore. Whether you are for-profit or for charity—your information offers a chance for free money to crooks all over the globe. They are unlikely to get caught and the money that comes from their theft will never be traced. Zealously guarding your assets every single day is a requirement in today’s high-tech environment.
Let Experts Educate You About Ever-Changing Cybersecurity
I have run the numbers for many business owners and outlined possible safety protocols for companies of all sizes and budgets. Yes—there is a cost to doing something right, but there can also be a significant cost if you don’t. Start with a conversation with a professional IT person or IT management company. Keep asking until you find the one that works for you. Once your protection is being enforced, then you can go back to only losing sleep over your teenaged children. Aptica is an easy place to begin. Call us. 260.243.5100.
Jason Newburg, 260.243.5100, ext 2101, is the founder and owner of Aptica LLC. This IT management and support company has been serving small to medium-sized businesses for 19 years in the region that includes Angola, South Bend, and Fort Wayne, IN, Battle Creek, MI, and Toledo OH.