Listen to your IT department, not your users.
Over the last decade technology has changed a lot. Although the internet has provided many positive things, risk has increased tremendously. Keeping the users happy is very important but it is the technology departments responsibility to protect the users from themselves. Over the history of small to medium sized organizations, technology departments have been viewed as a maintenance department. When a computer breaks we call the tech to come fix it. When leadership or users want new technology they buy it and have the technology department make it work. Inherently, users were driving the bus and the tech department saw to their needs with minimal push back. This approach is no longer sustainable. Anyone that does not evolve will eventually wish they had. Protecting your organization from cyber risk can be daunting and expensive. Especially if you are still giving your staff what they are “comfortable with” or “used to”. If you want to reduce the cost and effort to protect your organization, it all starts with a basic methodology. Implementing common sense policies and simple easy to manage technology increases security and reduces cost. Unfortunately, this will impact your users. Nobody likes change but if you do not change with the times it is much more difficult to reduce risk. Things like multi factor authentication, strong passwords, and a more restrictive environment usually does not make everyone happy. Executive leadership needs to listen and support the technology department. At the same time the technology department needs to step up and define the right way to do things. Standardizing on the same software for everyone. Standardizing on a platform and not having Windows, Mac, iOS, and Android. The more platforms the more there is to secure and support. They are all handled differently. Not allowing personal devices to be connected to the organization’s network. When a simplified methodology is implemented properly the users will be safer. If you cater to the wishes of the users and have a cybersecurity breach the first place the finger will get pointed is at the technology department.
You’ve had your financial audit…. Next up is your technology audit!
Given how much businesses now rely on digital infrastructure, a comprehensive, formal technology audit could be argued to be just as essential to an organization’s long-term health and success as a financial audit. Just like businesses conduct financial audits to evaluate the accuracy, compliance and efficiency of their financial state, a technology assessment can be just as critical, if not more so, in today’s tech-driven world. Technology changes rapidly, and with it, new vulnerabilities emerge. A technology assessment evaluates vulnerabilities in your network, data systems, and infrastructure. Given the growing threat of cyberattacks, regular assessments can help identify weaknesses before they’re exploited. Similar to how financial audits examine how well a company can weather a downturn, a technology assessment ensures that a company can recover quickly in the event of a cyber attack, hardware failure, or other tech-related disaster. A key component of a technology assessment is evaluating disaster recovery plans, data backups, and system redundancy. Just as financial audits look for waste or inefficiencies in spending, a technology assessment can uncover redundant tools, processes, or systems that could be streamlined or replaced and can help identify areas where the company is overspending on technology services, licenses, or subscriptions, and suggest more cost-effective solutions. In short, technology isn’t a secondary concern anymore—it’s woven into the very fabric of how modern businesses operate and compete. The risks of failing to regularly assess and improve your technology is just as severe as failing to properly audit your finances.
Sophos 2024 Gartner award
Sophos does it again! For the third consecutive year, customers have named Sophos a Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Network Firewalls reports. L6 Technology leverages Sophos products at many of our customers. Sophos is a comprehensive cybersecurity solution managed from a single dashboard. The integration between the different areas of cyber protection is a cost effective proven option.
Free Internet for Park Districts?
Illinois General Assembly Bill SB2631 could make that happen. The following is what the bill states. Synopsis As Introduced Amends the Illinois Century Network Act. Provides that, on or before June 30, 2028, the Department of Innovation and Technology must offer free internet access through the Illinois Century Network to park districts, forest preserve districts, conservation districts, and soil and water conservation districts. The full bill information can be found here SB2631 Senate Sponsors Julie A Morrison Illinois has a state and federally subsidized internet network that was put in place to help schools and libraries. It is called Illinois Century Network (ICN) and if you click on the logo below you can get to their page. Illinois General assembly bill SB2631, if approved, would allow park districts to take advantage of this network. If that happens, park districts will be able to get high quality fiber internet access at a much lower cost and even free. It will be faster, more reliable, have better support, and many more features. Illinois Century Network (ICN) also has a shared hosting datacenter in the basement of the Schaumburg Police Station. They provide this service at a dramatically reduced cost compared to standard vendors that provide these services. For our customers that use VSI products, this is a great cost effective value.