
The hardware you use your for businesses, a router and a firewall, switches, wireless equipment, all of this, even though it’s hardware it also requires updating to keep security. Typically, for your computer, you have updates for hardware, but other hardware network pieces like printers fall into this category.
This is what’s called a firmware update. And the difference is firmware is software that firmware actually resides on a chip, on a silicon processor of some sort within the hardware. So we do have to go out and download firmware updates for these devices and apply them.
You should be going in and applying those firmware updates to those devices and rebooting those devices on a monthly basis, just to keep them all on the latest version, and to keep them all on the latest security patches as well. A lot of people don’t think about that.
If you were to go through a security penetration test, you’d be surprised at all the red you would see on your report from all of your hardware being out of date. There’s a reason they update that software, hackers can easily get into that software exploit security holes.
And once they do that, they’re on your network. Now they can start capturing network traffic. They can see whose computer is insecure and bounce over to that. We do monitor and maintain that for all of our clients as well.
And that’s another reason we like to standardize on equipment. We always use the same brand of hardware or firewalls, for switches, wireless equipment. We use the same brand, same models as much as possible just to standardize it, which helps us to keep up with the updates for all of them, knowing what needs to be where.
And obviously within the last year with so many people moving and working from home, we’ve had to deal with that a ton and that sometimes can be an issue. Users need remote access to the office, or they need to have access to files. And sometimes it doesn’t work. Not because something’s wrong with the office network. It’s usually something on their home network is outdated. Firmware hasn’t been applied, it’s old equipment and their remote access software.
At least the software we use requires those to be at a certain level and requires that security to be at a certain level before it can be used. And if it’s not, it doesn’t work. And 99 times out of a hundred, it’s something on their home network that’s causing the issue.
Do you need help? Remote worker access challenges or network access problems? Give us a call!
Host info
Kelly Herrod, the founder and CEO of Herrod Technology, started the company in 2000 to provide simple IT solutions for small and mid-sized businesses. His personal approach, over 30 years experience and his ability to simplify IT sets him apart in the IT industry.
Thanks for listening! Don’t forget to subscribe on Apple Podcasts, Spotify, Google, or Stitcher. (Or your favorite podcast app.) If you like what you heard, please leave a review on iTunes and share what you liked about the show.
16. Having A Great Relationship With Our Customers Is Key
I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
14. Do Your Laptops Have Encryption Enabled? They Should!
Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...
Related Posts
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
14. Do Your Laptops Have Encryption Enabled? They Should!
Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...
13. Password Best Practices for Ultimate Security from Hackers
When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...
Subscribe for Podcast Announcements and New Episodes, Along with Information Tech and Cybersecurity Tips!
Your email is safe and secure.