A "Survival Guide" helps SMEs out of the security trap
Comprehensive IT security for small and medium-sized enterprises is easy to implement, yet many businesses go round in circles on this point. With six simple steps, companies can sustainably improve their IT security.
Company leaders are well aware of the threat posed by malware and cybercriminals - but they often lack the time and expertise to deal with the issue in depth and set the right course. The "Survival Guide" from security specialist ESET provides a remedy here. This guide leads companies and businesses in six pragmatic steps to secure IT. The free PDF is available on the Security Blog http://www.welivesecurity.de ready for download.
IT security: Well meant is half lost
Caught between full order books, a shortage of skilled workers and bureaucratic requirements, many SMEs have little time for their IT security. While they are the absolute experts in their field, the knowledge needed to secure their network is often lacking. "When the school-age son acts as administrator or the accounting clerk becomes the security officer with a handshake, you immediately know why hackers have targeted this group," says Thomas Uhlemann, security expert at ESET.
"Many companies want a blueprint that they can use to take IT security into their own hands or tell an external service provider exactly what they want. This is exactly what our Survival Guide offers."
6 steps to secure IT
The security experts at ESET have developed a step-by-step system that guides companies to their goal in manageable steps. Using the so-called A-F method, company leaders gain an overview in the first place and then derive the necessary measures and processes:
- ASSESS - Documentation of devices, risks and resources
- BUILD - Establishment of safety guidelines
- CHOOSE - Selection of control mechanisms
- DEPLOY - Introduction of control mechanisms
- EDUCATE - Training of employees, managers and suppliers
- FURTHER - Further documentation, inspection, tests
"Anyone who takes these steps to heart and then selects the appropriate security solutions will increase their security level many times over. Malware protection, encryption and 2-factor authentication transform even the smallest networks into an almost impregnable fortress," Uhlemann summarizes.
Bringing know-how into the company
Understanding IT security as a process is just as elementary as the use of tailored security solutions for the effective protection of corporate data and the entire IT infrastructure. Compared to large enterprises, however, small to medium-sized companies in particular do not have the human resources and thus often do not have the necessary expertise to implement the right IT security technologies and solutions to the required extent and to adapt them to the respective structures. MSP solutions are a promising and highly flexible approach here, in which the entire handling and adaptation of the security solutions used are taken over by specialized system houses.
The survival guide can be downloaded here: https://www.welivesecurity.com/deutsch/2019/05/09/eset-survival-guide-hilft-kmu-aus-der-security-falle/