SMBs: Creating a Simple Cyber-Security Plan

Cyber securitySome SMBs make the mistake of thinking that security breaches only happen to the big names. Despite all the attention that the Home Depot, Anthem, and Target data breaches are getting, cyber-attacks are an equal opportunity threat for every size of business. In 2013, approximately 44 percent of SMBs were the victims of a cyber-attack, according to the National Small Business Association.

Large enterprises are just as vulnerable to cyber threats as smaller companies, but some SMBs can’t afford the incredible cyber security measures that enterprises use to protect their data and customers. Instead, SMBs must stay sharp and focused when it comes to protecting themselves on a small scale against a broad range of cyber-threats– from phishing attempts to full-blown brute force.

The Basic Steps of a Cyber Security Plan

Although there are a wide variety of different tools and software available, the most important cyber-security tool is a good plan. The following outlines these three crucial steps toward strengthening a company’s cyber security without a detrimental effect on the bottom line or employee productivity:

  • Create a thorough inventory of both physical and digital assets. These physical assets include devices used on a daily basis to interact with and manipulate important data, especially that which is stored in the cloud. Companies also should inventory any valuable data that can be accessed by employees.
  • Develop a comprehensive computer privacy and security policy. Such policies can help strengthen company-wide efforts to promote cyber security on an employee-level basis. By carefully and comprehensively defining how, when, and where employees can be exposed to certain types of data, cyber-security experts can prevent thieves from making off with digital gold.
  • Always be on the lookout for unusual cyber activity. Eternal vigilance through monitoring IT systems on a 24-hour basis is a necessity for foiling most, if not all, cyber-attacks. However, hackers are just as vigilant, which is where the latest lines of anti-virus software and other countermeasures come in. These assets must be kept up-to-date in order to deal with ever-evolving threats.

What Else Can Be Done?

Training employees to be more vigilant when it comes to cyber security is an excellent idea. Unfortunately, many SMBs simply cannot afford the time and effort that in-house training entails; in addition, these companies often lack the experience that is necessary for comprehensive training.

As a result, SMBs meet their cyber security needs by contracting with third-party experts and managed network security services. These outside service providers represent an added expense, but the costs are minimal compared to the tremendous costs that a security breach can have on a business.

Creating a concrete cyber-security plan can mean the difference between a successful company and one that is hobbled by a lack of basic cyber-security protections. The former is, of course, the more appealing option.

How Resellers Can Effectively Utilize SIP Trunking in Network Migration

Cloud telephonyMoving away from private branch exchange (PBX) telephony systems is a big deal for most businesses, especially given the huge time commitment and expense that go into such a move. Nevertheless, organizations are being encouraged to shun PBX in favor of cloud-based telephony–all in the name of cost reduction and improvements in efficiency.

This isn’t necessarily a bad thing, but it can be a bit frustrating. Fortunately, there’s always the hybrid approach, which leaves most of the legacy system in place while taking advantage of the latest and greatest in networking hardware. At the heart of it all is the session initiation protocol (SIP) trunking solution, which is designed to allow the implementation of cloud-based telephony over existing PBX infrastructure.

What’s the ROI?

The first thing that any reseller should do over the course of overseeing such a migration is to review how much of a return on investment (ROI) an extension of PBX to a future hybrid system offers. Companies can make quick and useful cost comparisons by comparing the costs of maintaining the current system versus implementing a hybrid system with SIP trunking.

Moving to SIP Trunks

Resellers also can do their part to make the transition to cloud-based telephony services by converting existing long-distance carrier circuits to SIP trunks. This way, resellers can place much of their focus on reducing the overall costs of the conversion process. Further reductions may occur through natural downsizing of vendors and the reduced necessity of several redundant SIP trunks.

Deploying E-SBCs

Enterprise session border controllers (E-SBCs) also play a role in the migration process. These devices are instrumental for managing voice over Internet protocol (VoIP) communications as well as mitigating hostile attacks. It’s important to have a sufficient number of E-SBCs deployed to cover a wide variety of potential cloud services.

Transition from UC to SIP

Another aspect of SIP trunking deployment involves transitioning existing unified communications (UC) services to SIP trunks. Resellers can play an instrumental role in guiding and overseeing the transition from existing UC services to those based on the SIP trunk infrastructure.

How It All Stacks Up

It’s important to take a snapshot of the company’s dedicated access costs (along with long-distance calls) prior to SIP trunking and after the migration process is complete. This gives the company a clear picture of its savings and a chance to inspect areas of the SIP trunking migration where improvements in cost-effectiveness and efficiency can be made.

Migrating to the cloud can be an adventure in its own right, fraught with a variety of challenges for businesses to overcome. However, the hybrid method of SIP trunking migration can help ease and simplify that process to a significant degree.