Blog Layout

Ways to Better Protect Your Data

1. Use Mobile Device Management Software

Many small businesses issue tablets to employees working in the field. It’s important for businesses to have a centralized mobile device management (MDM) tool capable of locking certain apps and restricting features that can potentially place the devices at risk. Additionally, companies can wipe any data remotely with their MDM tool if the device is stolen.

2. Disallow Personal Device Usage for Work-Related Tasks

Disallowing employees to use their own personal devices for work-related tasks can be very helpful for protecting data. If an employee saves data to their personal device, it can be extremely difficult or near impossible to remove this data from the device after an employee terminates. Make sure you have a company policy that speaks to use of personal devices.

3. Use Endpoint Encryption

Many employees leave their laptops unattended in public areas (ex: back seats of cars) and they can be stolen. A thief is unable to login without the Windows domain password, however, they can remove the hard drive and view the data by connecting to another computer. By using encrypted hard drives, your data is protected from being viewed, accessed or stolen as the thief won’t be able to pull up the data using another computer.

4. Test for Backup Data Restorability

Most small businesses receive emails notifying them when their backup jobs run successfully, however, these emails can’t confirm whether that the backup data is actually restorable. Restorability testing should be completed on a consistent basis. A “successful” status is not enough to ensure you can recover in the event of disaster.

5. Run a Social Engineering Campaign  

The easiest way for hackers to infiltrate your organization is through your non-technical end users. It’s as easy as sending a phishing email to your finance department or requesting information over the phone. Enterprise organizations have strict, documented processes for providing sensitive data, but small organizations that lack these processes have become the key target of hackers. It’s best practice to utilize an IT consultant to conduct a social engineering campaign and educate your end users.

6.  Clean Active Directory

When an employee leaves the company be sure to deactivate their Windows user account in your Active Directory domain. This helps prevent former employees or hackers from accessing your systems and causing damage.

7. Follow the Principle of Least Privilege 

The Principle of Least Privilege states employees should only be given permission to access the data necessary to complete their job functions. This helps prevent employees and former employees from leaking confidential data or using data for their own non-business purposes. The easiest ways to compartmentalize users is by writing group policies within Active Directory or adjusting the security settings within your applications.

8. Stay Current with System Upgrades

Upgrading your systems to the latest versions doesn’t only provide you with the latest features, it also protects your systems. Vendors, like Microsoft, will patch any known security vulnerabilities that were exposed in their previous release. Patches can also prevent the spreading of viruses or worms by blocking the vulnerability used in spreading the virus.

9. Don’t Use Unsupported Systems

Businesses continuing to use unsupported operating systems are exposing themselves to threats. When vendors like Microsoft sunset the support of an operating system, they stop upgrading the system and patching its security vulnerabilities. Please note that Microsoft will be ending Windows 7 support in 2020.

10. Create a Separate Guest Network

Commonly, small businesses only have one wireless network. The downside to only having one network is that visitors will be authenticating to the same network that provides access to sensitive client and financial information. It’s best practice to isolate guest access by setting up a new vLAN or by physically separating access to the local area network (LAN).

written by:

Brendan Kelly

Brendan Kelly is a Business Alliance Manager focused on building partnerships with technology companies that can help The Walker Group’s clients increase efficiencies, reduce operating expenses and mitigate IT security risks. Prior to assuming the Business Alliance Manager role at Walker, Brendan spent 10+ years in new business sales and account management roles while working for both software and service providers.


More Recent News

hands typing on keyboard, overlay of security login windows, computer
January 24, 2025
In today’s digital landscape, data privacy and protection are more critical than ever. With cyber threats ever-present and on the rise, businesses and individuals alike must take proactive steps to secure sensitive information and comply with industry regulations. Whether you operate in healthcare, finance, retail, manufacturing, or any other sector handling personal data, robust privacy practices can protect your customers, enhance trust, and prevent costly breaches. Likewise, individuals must take similar precautions to safeguard their personal information from identity theft, financial fraud, and cyberattacks at home.
The Walker Group: Year in Review Newsletter  2024
December 18, 2024
As we close out another year, we’re reflecting on the incredible milestones, partnerships, and growth that defined 2024. From groundbreaking projects to community impact, our team has worked tirelessly to push boundaries and deliver exceptional results. In this issue, we’ll share highlights from the past year, celebrate our collective achievements, and look ahead to an exciting 2025. Thank you for being part of The Walker Group journey—here’s to continued success together!
November 22, 2024
Celebrating Our Spotlight in EY ’s Latest Publication We are incredibly proud to share some exciting news! Our business model and the purpose that drives us every day have been spotlighted in EY ’s latest publication, Beyond Sustainability as Usual: How Business Transformation Can Unlock the New Economy. This recognition is a meaningful opportunity to tell our story and inspire others to discover and follow their own true North Star. EY’s New Economy Unit publication dives deep into groundbreaking examples and case studies of businesses driving transformative change. It highlights organizations that embody new economy principles—those that are reimagining traditional approaches to create a better, more sustainable future. We are truly honored to be featured among such inspiring companies and to contribute to this vital conversation. Our inclusion in this publication is a testament to the power of purpose-driven business. We believe that aligning operations with a strong mission not only drives success but also creates lasting value for people, communities, and the planet. This feature is a reflection of our ongoing commitment to innovation, sustainability, and transformation. We hope this recognition serves as a spark for others to think boldly and creatively about how business can be a force for good. Together, we can unlock the full potential of the new economy and build a brighter, more sustainable future.
Share by: