10 Simple IT Security Steps for Small Business

IT Security is Critical

Malware attacks due to lack of IT security have made big news lately. Cybercriminals are a huge concern for all businesses. Unfortunately, small businesses that lack an IT department have a higher risk of exposure to their attacks. Though not as attractive a target as a Fortune 500 company, they may be considered by hackers as a much easier mark. Ultimately, a single attack could wipe out many small businesses.

After taking steps to upgrade our own security procedures, Eron Iler, Fleetistics fearless leader, documented what he learned through the process.  In this video, he shares 10 steps that any company can take to improve their IT security and lower their risk of falling victim to cyber-attack. To learn about cyber crimes visit IGTech365.

Transcript of 10 IT Security Steps
Click Here to View

Hi everybody! Eron here with Fleetistics, and today we’re going to talk about something a little bit different than fleet tracking technology. What we’re going to talk about is technology
that has come to the forefront in the news lately, and it’s really about securing your business. We’re not only interested in your fleet, but we want to see your overall business flourish and in the future we hope to bring you more business related products and services that will just help you grow your business and make it a more profitable business.

So the topic today is actually IT security. There are some things that we have done internally to improve our security
and these are the same types of things that most small to medium businesses should be doing as well.

Now if you’re in a bigger organization you probably have IT staff that is available to take care of these things for you. You
may hear some things that you’re not doing and you may have to ask your IT group as to why you’re not doing certain things, because these are pretty basic you know type security measures that should be implemented.

So the very first one is two-factor authentication, and if there’s anything that’s going to help you avoid getting hacked – and it’s the easiest thing to do – two-factor authentication is it. You can receive an email, an SMS, or you can use the authenticator app to get a code which then allows you to enter that code to
then access sensitive areas of your organization or to sign in to perhaps you know a company resource like SharePoint or something like that. It is a very very simple way of doing
things.

And with all security there’s a trade-off. There’s convenience
versus security, and every time that you add more security you’re going to have a little more inconvenience, so you’ve got to realize that in our world today we are just dealing with
things differently. And now when it comes to malware, spyware you know the encryption technology, things of that nature, those things have very, very real consequences. And you can see from the gas, the gas company who is a major organization which would probably or should have had some of the best IT available, they still got caught. So what are you going to do in your small business? And it is just as easy as clicking on something that looks familiar, not paying attention to the destination URL and then you install something that encrypts your hard drive, right? Or, you know, even worse yet it gets into your network and encrypts your network so something like two-factor authentication is a very easy way to put up an initial barrier to that process.

All right number two is only allow computers that are connected to your network through the company to actually
connect up to your resources. And it is convenient for us to allow people to work from home, and use whatever computer computer they may have already in place. It is also inconvenient for employees to have to use a company computer because they probably already have a workstation set up, however, what you cannot do is rely on that computer and that employee to manage their security the same way that you want to manage your business security. Therefore, if you enable the functionality that only a company computer that is registered through your IT department on your network can actually connect to your company resources, you will avoid the holes that are created by employees who may or may not keep up with IT security. They certainly are not going to have the level of security that you would want to have to protect not only your data in your operation, but your customer information as well. And if you happen to be storing you know credit card information or sensitive data then by law you have requirements like this to protect that information. You know if an organization was to steal all your contact information… you know maybe it’s something they could find online, but if they took that list and turned around and sold it to a competitor (and I don’t know about you, but every day I get prompted via email “hey would you like to buy a list from this organization or this industry?” They can take that information and make it available to your competitors and then start calling on your customers. Right? So it may seem mundane for certain types of information but they can do a lot of things with data
that you and I don’t even think about.

So another step is to control what IP addresses can connect to your network. And even if someone’s working from home you can simply type in “what is my IP” you can get their IP address and you can share that with your IT department. The IT department can then configure the firewall to only allow certain IPs to connect. The firewalls have a lot of advanced functionality and you could actually do additional things like only allowing connections during certain times of the day.

So we know that a lot of hacking takes place coming out of
Russia and China and their hours of operation are typically not going to be our normal business hours. By blocking you know network connectivity outside of working hours, you’re going to
remove a huge chunk of opportunity for people in these other countries to hack into your network. Hackers don’t want to go where it’s hard to do things, they want to go where it’s easy. They may probe a lot around different companies and networks looking for these little gaps and then when they
find then they exploit it. If they can’t even touch yours because you’re, you have IP restrictions either by individual IP and or IP and by day and time, then you’ve created a hard surface or a
hard security scenario that they aren’t going to want to waste
time trying to figure out. If they can’t hack it then they can just move on to your neighbor or your competitor who hasn’t
done anything, and they will easily be able to continue on with
hacking.

The next thing is the implementation of Intune. Intune is a Microsoft product and it allows you to protect your data
on mobile devices, laptops, even PCs, but you know a lot of people connect phones, and I do the same thing, I connect my mobile phone to my work. I connect up SharePoint, OneDrive, email, OneNote… All of those things are on my phone, and what happens if my phone gets stolen, right? I’ve now created a pipe from my phone straight into my business. And because authentication has already taken place, if somehow they can get into my phone then they’re going to have that direct
access well. With Intune, it’s an app that installs on these devices, and if you know the the phone gets stolen, or a laptop
gets stolen like we had. In our case we actually had an installer who had a laptop stolen out of the vehicle, and at that time we had remote monitoring software on the laptop and we
were actually able to log into the laptop and we could see the user was, you see their emails and we could see that they were in Africa, it was West Africa somewhere… in the, I think it’s called the Cape Horn area, and we could see what they
were actually typing and things like that, so we sent a little message and consequently we never heard from them
again after that. But Intune allows you to go in and
compartmentalize your company information and lock it down
and uh you know if something gets stolen you can reach out to that device and you can lock that information and delete it off of the device completely. And it’s only affecting business related information and there’s no spyware involved, so your employees don’t have to worry about that. But, you know if something happens you can grab that data and you can delete it off that device and know that your information is protected.

If you need assistance or are interested in Microsoft 365 or Intune, I would recommend checking out IGTech365.com, which we’ll post in the show notes. IGTech365 is an IT company. They handle our IT and they can handle your IT as well. Even if you have the Microsoft Office 365 package today or Business Suite today, they can become your partner of record and it doesn’t change your price or anything else. And once they become your partner of record, then they will actually also provide support that goes along with that. So if you have a question or a problem then you don’t have to call Microsoft. You call IGTech365. They’ll handle it and get on the phone with Microsoft or help you through that. It’s a full service it company, so you can check with them and see what other services they offer as well, from Microsoft Teams as a voice over IP system, which we also use internally – which is great, to the full office 365 Suite.

The next thing is to scan network connections for sensitive
information patterns such as credit cards and social security numbers. That’s a little bit more complicated and a little bit more advanced. Most small businesses aren’t going to do
that, especially if you don’t maintain that type of information, but there are programs that you can put on computers that will scan traffic in and out, and look for patterns of information i.e a social security card number or a credit card number. And when it recognizes that 16 digit number then it flags it and sends that information to Management, so they can look at it and make a determination as to whether or not that’s something that should or should not be happening.

Monitoring you know computer activity is another one. Whether you’re looking at detailed information or just looking at activity. If you see a computer as active during off hours, then maybe somebody is taking control of that computer when you know that employee is not going to be working. So if you saw activity at three o’clock in the morning, and you know it’s a it’s an administrative position that would never have a need to work at that time frame, then you can pick up on that and go in and take a look and see what’s going on.

Something as simple as locking your screen, and you may not know this but if you hold down the windows key and hit the L key at the same time, it’ll actually lock your computer, which is a very easy habit to get into when you’re walking away from your computer. Even in your house, you know you have people coming and going in your house, maybe a cleaning service something of that nature, and if you walk away from your computer and all of a sudden you know your computer is opened up and you leave the house to go walk the dog, there’s nothing preventing someone from getting on your computer, taking a picture of your computer, things of that nature. So getting in the habit of locking that screen and putting an auto lock on that screen after let’s say five, ten, thirty minutes of no activity is a great way to help lock down the computers and avoid you know that type of intrusion that you might not think happens, but it’s totally possible.

The next thing that we did is we updated our password policy. And changing your password every 30 days is just not practical. Everybody hates it it’s, that is a sacrifice that I don’t want to make, but what we can do is make the passwords more complex, and we can make them longer. We can require capitals and lowercase, and special characters and some number combinations, things of that nature that are going to make the odds of it getting hacked pretty, pretty low. And once you do that, then you know maybe change your password once a year type thing is what you want to do. IT people are going to have a different you know opinion on that, but if you do that in conjunction with two factor authentication, then you’re going to have a pretty secure login process.

And the last thing is taking advantage of the you know the employee background checks these days who is actually getting into your systems. Who are you hiring are they the right
people? So there’s a personal security protection that you need to be looking at. There are so many online services today that can run background checks for you to make sure that the people that you are, that you’re hiring are the right folks, and the people that you can trust to handle certain types of sensitive information. And what you don’t want to do is have information that walks out your organization. A platform like SharePoint, which is part of the Microsoft 365 platform, can also monitor for downloads of files you know large quantities, if files are being deleted it can monitor that. It does keep a recycle bin for you and a version history for you which is great, and again if you want some help with that and you want to learn more, IGTech365 is the company to call.

You know so there’s protections in all these different areas that you need to be looking at and they’re just so, so simple that there’s no reason why you shouldn’t go about making some of these changes. But these were just 10 things that I came up with as a small business that would make sense for your business whether you have two people, right? If it’s not family still you know some of this stuff you want to do regardless, even on your personal computer. But if you have two people and they’re not all family then that’s when you should start this practice. And if you have it implemented when you hire people then it’s much easier than to implement after you’ve got you know people that are that are hired and used to doing things the old way, right? Because change is always difficult.

So that’s what I have for you today. I hope you enjoyed, I hope you got some tips. If you enjoyed the content, hit the like and subscribe button down below, and we will see you on the next video. Good luck growing your business and stay profitable!

IT Security Top Ten List

  1. Implement 2-Factor Authentication.
  2. Only allow resource access to computers that are connected to your network.
  3. Control what IP addresses can connect to your network.
  4. Only allow connections during certain times of the day.
  5. Implement Microsoft Intune or a Mobile Device Management (MDM) service
  6. Scan network connections for sensitive information patterns.
  7. Monitor computer activity.
  8. Lock screens when not at your computers. (Windows + L key)
  9. Update your password policy to be 8+ characters, numbers and symbols.
  10. Require employee background checks.
Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

The Collision Detection Experiment in Analytics Lab

Submitted by Kim Thoman.

Collision Detection in the Analytics Lab

The collision detection experiment in the Geotab Analytics Lab reviews and confirms collisions that are automatically detected by the telematics GO device. Users can also use this tool to report collisions manually. Here is a link to “How to download and install Analytics Lab” in your Geotab database. After installing Analytics Lab, go to the Collision detection experiment and click try it.

Collision Detection – the Technical Stuff

Collisions are detected by the Geotab GO device upon any acceleration greater that or equal to 2.5 G, where G is 9.81 m/s2 (the acceleration due to the Earths gravity). This is classified as a collision-level event. Geotab GO device firmware will not use/Up/Down accelerometer data (also known as the Z axis) in this calculation. The calculation uses the magnitude of the hypotenuse between X and Y where X is Forward/Braking and Y is Side to Side.

When the GO device detects a 2.5 G event in any direction, the device is triggered to start recording at 100 Hz frequency. This detailed, high-resolution information will be reflected in the trip in MyGeotab, and includes acceleration, GPS speed, and brake data (if available).

About the Experiment

The Data Analytics Research team, using advanced analytics techniques, has developed a model capable of detecting collisions when they happen to present critical information on point of impact, magnitude to help users monitor, act, and take measures to mitigate future collisions.

How Does the Collision Detection Experiment Work?

Because it can provide an accurate scientific record of events, telematics data proves to be highly valuable for Fleet management. The model monitors the telematics data and applies what it has learned as signals in accelerometer data to detect and classify collision events. Due to the granularity of the data, the model can tell you many things about a collision such as a point of impact, trigger type, location, time, and much more. With this experiment, users could gain a broader perspective on the event by looking at the historical patterns for a specific driver or vehicle.

What is the Benefit to Fleets?

  • Fast and easy to use method to detect potential collisions.
  • Provides critical data to take Collision workflow decisions and actions.
  • Point of impact can provide a better understanding of the overall accident as it occurred.
  • Increasing overall fleet safety by unlocking patterns in-vehicle, locations, and conditions to reduce potential collision in the future.

For more detailed information on collision reconstruction, you can download this white paper from Geotab

Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

The API Explorer Experiment in Analytics Lab

Special thanks to Darryl Arnold for assisting with this post.

API Explorer In The Analytics Lab

The next experiment we will review in the Analytics Lab is the API Explorer. If development is outside the scope of what you do, you may want to share this blog post with your developers to show them how they can leverage a great tool. Here is a link to “How to download and install Analytics Lab” in your Geotab database. After installing Analytics Lab, go to the API Explorer experiment and click to try it.

Taking Advantage of the API Explorer

If you are looking for new ways to integrate and evaluate your fleet data, this tool can save you time by using pre-defined queries and API calls. A catalog of Beta APIs is available for accessing and viewing response outputs. Multiple languages are supported.

Current use cases include contextual risk index, nearby fuel stations, nearby rest areas, fuel benchmarking, new zones, and collision events. Using the Leave Feedback button delivers your comments, likes, dislikes, and use case suggestions directly to the Geotab development team.

Access Data from Other Analytics Lab Experiments

When you select a Beta API from the list, a brief description appears below it. As you can see, some of the available selections are tied to other Analytics Lab experiments such as Intelligent Zoning and Fuel Economy Benchmarking.

Practical application of the API Explorer

The API Explorer provides developers with a tool for testing queries and calls prior to writing code. The ability to test multiple approaches to a call in real-time prior to coding can save numerous development hours. For report developers, the API Explorer provides the ability to quickly obtain results on a one-time call or query.

What’s next?

If you enjoyed the API Explorer experiment, our next and final Analytics Lab post (for now) is on the Collision Detection experiment. As new experiments are added we will be sure to share them with you as well.

Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing
Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing

Fuel Economy Benchmarking

The Fuel Economy Benchmarking Experiment

The fuel economy benchmarking experiment allows you to analyze your fleets fuel economy based on real usage and calculate potential cost savings using the calculator. The knowledge gained from benchmarking lays a solid foundation for decision-making. Measuring your performance against the other fleets can lead to opportunities for improvement.

In the past, benchmarking has been a challenge, especially for small fleets, because they were not able to connect to the incredible amounts of data needed for accurate comparison. Geotab has assembled that data and made it accessible through this experiment alongside your current vehicle data.

After installing Analytics Lab, go to the Fuel Economy Benchmarking experiment and click try it.

What can I learn from the Fuel Economy benchmarking experiment?

First, in this experiment, you can easily view vehicles based on poor, average, and good categories for further analysis. It also displays vehicles based on your top performers and worst performers.

Additionally, by drilling into the groups, you can see more details on your vehicles. You can even select alternative vehicles to compare them to.

Finally, the fuel economy benchmarking savings calculator allows you to input a comparison vehicle and fuel cost. By adding more vehicles to the list you can see the result of replacing a group of vehicles that you choose.

What are some practical applications for my benchmarking results?

With this tool, when it is time to buy new vehicles, you can more easily see which are your best candidates for replacement. Even better, you can easily research what to replace them with. It will also help to identify drivers that are getting below the expected fuel economy for the vehicle they are driving. Ultimately, those drivers can be monitored for the wasteful driving habits that contribute to their higher fuel consumption.

Geotab technology brings immediate insight to your doorstep. As soon as the connected device produces the data, it can be aggregated and benchmarked virtually in real-time. By revisiting this experiment after driver behavior has been addressed, or vehicles have been replaced, progress can be easily measured.

What’s next?

Did you find fuel economy benchmarking to be a useful tool? Keep an eye out for our next Analytics Lab post on the API Explorer.

Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing
Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing

Analytics Lab and the Intelligent Zoning Experiment

Analytics Lab, what is it?

The Analytics Lab free add-in provides a platform for current Geotab users to test features currently under development. By using the Analytics Lab, anyone can participate in the development of new features being considered for addition to the Geotab platform. By rating the experiments and providing feedback, users are able to provide Geotabs development team insight into what is good, bad, irrelevant, or extremely valuable to end-users. User suggestions will influence the direction of future development.

How do I get it?

To install Analytics Lab, simply log into your MyGeotab portal, navigate to the Geotab Marketplace, and search for Analytics Lab. Once it pops up on the list, click to add it to your cart, agree to the terms, and click finish to install. It can be done in seconds!

How do I use it?

Once installed, click Analytics Lab > Catalog to see the current list of experiments. When you see one that interests you, click “try it” and enjoy what comes next. After using it, be sure to leave some feedback and if you found some value, give it a like.

Intelligent Zoning

Today we are going to highlight the experiment on Intelligent Zoning. This is one that just about every Geotab user can get some mileage out of. It can be used to make your current zones more accurate based on where vehicles actually stop, and it can be used to identify zones that have been overlooked or you have not yet had time to add.

Once you click the Try It button you will land on a page that lists the zone recommendations with a relevance rating. A high relevance score would indicate more frequent stops in that zone.

We chose the zone at the top of the list and clicked the Action Needed button to get a birds-eye view of the recommended intelligent zone.

We already had some rather large zones drawn around this office which are displayed as the dark gray zones. Geotab has determined that our vehicles consistently park in the much smaller zone outlined in blue. Stats are also displayed for the average number of stops per month and how many vehicles have stopped at this location. The graph shows us the trend is downward and below that some additional information on the duration of stops as well as driving time to the stop. All of that is excellent information we can use to better understand trips to and time in this zone.

Intelligent Zoning Action Needed screen

Importing the Intelligent Zone

From this point, we can use the Rename and? Import Zone buttons to make this recommended zone a permanent zone in the database. Additionally, we can choose to keep or discard the zones we previously used. Simply disregard recommended zones that are not relevant. So far, everyone we have shown this tool to has come up with a different reason to have it and a different way to use it. What is yours?

What’s next?

Be on the lookout for our next installment of the Analytics Lab series where we will take a closer look at fuel economy benchmarking.

Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing
Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing