Security technology is getting smarter, but so are cyberattackers. Perhaps you’re thinking that your company is an unlikely target, or that at the very least, your IT person has the security situation under control. But the reality isn’t as simple as you’d think.
Cybersecurity doesn’t solely fall into the hands of your MSP. You and every single one of your employees play a critical role in cybersecurity. You also don’t have to know anything about technology to make a powerful contribution to your company’s cybersecurity. Why isn’t cybersecurity just the job of your IT person?
Two reasons: passwords, and shadow IT.
Your passwords, your responsibility
Your MSP (Managed Service Provider) likely provides basic security, or might even have a specific security offering, but they can’t fully control your own basic security practices that take place within your organization. Let’s talk about the front-runner for many cyber breaches – passwords. Recently, we took a glance into the dark and scary world of Password Horror Stories and realized that the problem stems far beyond what you might think.
Have you ever written a password on a sticky note? How about sending a password in an email? Your IT provider isn’t accountable for these security practices. In fact, they probably don’t even know that they’re taking place. Yet, mishandling passwords in this way can have powerful ramifications on your company’s security.
There’s a reason it’s called “shadow IT”
What apps and technologies do you use that your MSP isn’t aware of? Think carefully. Do your employees have apps used for confidential work-based operations downloaded on their mobile phones? Has any department in your organization ever used the free version of a cloud platform because it’s not in the budget to purchase the paid version?
You’re in the business of getting things done, and sometimes the easiest way to do that lies in a platform that isn’t currently authorized. It seems safe, and sometimes it is. But when it isn’t, the repercussions can be devastating. The apps and devices used for work that your IT provider doesn’t know about are called shadow IT. In other words, they’re the technologies that live in the shadows of your IT provider’s knowledge. What it comes down to is simple: your MSP can’t protect what they don’t know exists.
Take security into your own hands with MyGlue
It’s not all doom and gloom when it comes to taking responsibility for some of your own security practices. In fact, there are great and simple ways for you to have more control over your security while enhancing collaboration with your MSP.
That’s why we’ve created MyGlue, a secure password and documentation vault aimed at protecting your business’ digital footprint. Using MyGlue, you can store all of your passwords, alongside documentation associated with your processes, so that they never have to be stored on a sticky note or sent in an email again. By giving select employees access to the passwords they need in MyGlue, no one will have to search for information again.
Not only that, but your MSP can collaborate with you in MyGlue. You can choose what passwords and documentation you want to grant them access to so that they can continuously provide you with their very best security practices as well. This collaboration will allow them to know what apps you’re using, and ensure that those are just as secure as everything else you use.
MyGlue is a documentation system, designed to meet the needs of small- and medium-sized businesses (SMBs). MyGlue gives you the ability to document your key assets and processes in a single location. Granular security means you can control who sees, edits and owns each document. MyGlue – if it’s worth doing, it’s worth documenting.