Archives - Small Business

Test your DKIM records

Domain key identified mail (DKIM) uses public and private keys to ‘sign’ an email you’re receiving. This often prevents messages from hitting spam or junk, and isn’t completely necessary. However, it’s worth adding DKIM verification to your email domain. Different providers have their own techniques for doing so, but once it’s up, send a test […]

Discover desktop-as-a-service

If you’re running a small-to-medium business, it might be prohibitively expensive to buy and send good hardware to your remote workforce. Desktop-as-a-service (DaaS) providers are here to fill the IT gap, though. They effectively upgrade a laptop or desktop machine with a virtual representation of your company network, whenever you require it. This is fantastic […]

Implement a “clean desk, clear screen” policy for employees

A clean desk policy involves removing any sensitive business information from your desk everyday. This can include USB sticks, notebooks, business cards and printed documents. Inadvertently leaving them out is an invitation to data theft, which could result in a serious breach of your business’ network. Add a ‘clear screen’ policy, so employees are required […]

Create fail safes for employee devices

If you have a bring your own device (BYOD) policy at work, make full use of mobile device management (MDM) applications so you can remotely access, track and wipe the data from a device should it be lost or stolen. High end MDM will also allow you to set regular automated data backups to your […]

Use Google Analytics to track visitor locations

Your business website may be a convenient backdoor into your systems which hackers could exploit to gain access to sensitive information, or simply hijack your website and hold it to ransom. As hackers will often bounce through VPNs across the globe, you can use Google Analytics to monitor where traffic is coming from and flag […]

Educate your employees

Securing business data and information is tantamount to keeping your company safe and fully functional. When it comes to threats like phishing scams, your employees are your first line of defense. Make sure teams are aware of risks and what to look out for. Provide refresher training, including useful insights into how they can keep […]