Skip links

IT Security:
What you need to know &
How to help protect your business

IT security is something everyone now needs to know about. As individuals, we must do our bit to help protect our business.

If you are worried about any aspect of general security or are suspicious about something in particular, please get in touch with us immediately so we can help.

There are a number of tools which we provide to allow your business to secure its IT systems, but the key ones you’ll see and work with are:

spam

Spam Filter

A Mail Filter System is there to stop Spam and malicious actors from getting through to you. Further instructions on what you’ll see and how to use it are available here.

businessman hand show 3d cloud icon with padlock as Internet security online business concept

Email Encryption

If you need to send sensitive information via email, encryption ensures that it can’t be intercepted or read by anyone other than the intended recipient. Further instructions on using this tool are here.

Phish Alert Button

Phish Alert Button

A Phish Alert Button is a feature integrated within email clients or as part of a security platform, enabling users to report suspicious emails directly to their IT or security team with a single click. Learn more here.

What else is protecting you?

End Point Protection (Anti-Virus and other Security)

We operate advanced anti-virus and end-point protection systems. These are designed to provide the highest levels of protection without too much disruption to your daily work, so you generally won’t actually notice these unless they activate to stop something happening – e.g. to stop you from visiting inappropriate or dangerous websites or to halt the running of unauthorised software.

Windows and other software patching and updates

Updates are released when vendors like Microsoft need to update their software, either to make it more functional or, more often, to make it secure. At Better-IT, we run two patching systems.

Firstly, we have daily updates for common programs like Google Chrome and Adobe Reader, generally late in the afternoon. These are done in the background, and you won’t notice these happening.

Secondly, we have the Windows updates, which are carried out once per week. For these, you’ll receive a big pop-up on the day asking you to leave your device on overnight.

Email 1

Occasionally, you might be asked to restart your PC to complete the updates.

Email 2

2-Factor Authentication/Multi-Factor Authentication

Wherever possible, we enable 2-factor authentication/multi-factor authentication on the systems you use. This involves using your mobile phone to confirm that it is indeed you trying to log in.

Security Awareness Training

To make sure you are aware of the common methods hackers will use to get into your organisation’s IT systems, we run simulated attacks (sorry, we do actually try to trick you into breaching security!). If we catch you out, we’ll follow up with some quick and easy training to prevent you from getting caught out for real.

🍪 This website uses cookies to improve your web experience.