When it comes to network security, it is easy for small to medium sized businesses to say “not me”, “they are only after the big guys.” The reality is that attacks on all networks have been increasing year after year as hackers have become more sophisticated, and small businesses are being affected every day by relaxed or non-existent security policies.

A 2013 study showed that 1 in every 5 small businesses networks would be compromised. With the ever-increasing technological advances, it is likely that since then, these numbers have climbed, posing a significant risk for a potential breach, lost or stolen data, or some type of malicious threat.

Not only do you need to protect yourself from External Bad Actors you need to protect yourself from Internal Sources. Many security breaches are perpetrated by unwitting internal users allowing for outside bad actors access to their system. From websites with Malware to emails with viruses and Trojans, internal users are at risk of bringing on a security nightmare.

There are a number of ways Micro Solutions helps to ensure that you are at minimum risk:

External Threat Blocking

  • Updates - Keeping computers and network equipment updated is one of the most effective steps to preventing a possible network security issue.
  • Firewall - A common mistake in small to medium business networks is the lack of a business grade firewall solution. Often business owners are unaware of the difference between having a network router and having a network firewall in place.
  • Passwords - Password and password protection are proving to be an area that needs attention when discussing network security. Using sophisticated software and tools, hackers are easily gaining access to small business networks through simple or default passwords
  • Antivirus/Antispam - Most people know that antivirus and antispam software are necessary components of network security, but many people don’t realize why its so important until their computer or network is infected with a virus, malware, spyware, or a host of other potentially dangerous issues.


Internal Threat Tracking

  • Unauthorized Wireless Connection - See when unauthorized systems are attaching to your corporate wireless network.
  • New Account Creation on Business Owners Computer - Be notified if a new user account is created on an owners computer or any sensitive systems.
  • New Application Installed on LockedDown Computer - See if any application including an application that may contain malware is installed on a computer system.
  • Administrative Rights Granted to a User - See if a non-administrative user is granted administrative rights on a system they are not an administrator of.
  • Unusual Login Times - Logins tracked based on time of day. Unusual logins at 1am would be included in daily reports.

No matter the size of your business, network security is a definite requirement for every business in the digital age. If you are worried or unsure of where to start with an internal security audit, our team can help get you on track.