10 Simple IT Security Steps for Small Business

IT Security is Critical

Malware attacks due to lack of IT security have made big news lately. Cybercriminals are a huge concern for all businesses. Unfortunately, small businesses that lack an IT department have a higher risk of exposure to their attacks. Though not as attractive a target as a Fortune 500 company, they may be considered by hackers as a much easier mark. Ultimately, a single attack could wipe out many small businesses.

After taking steps to upgrade our own security procedures, Eron Iler, Fleetistics fearless leader, documented what he learned through the process.  In this video, he shares 10 steps that any company can take to improve their IT security and lower their risk of falling victim to cyber-attack. To learn about cyber crimes visit IGTech365.

Transcript of 10 IT Security Steps
Click Here to View

Hi everybody! Eron here with Fleetistics, and today we’re going to talk about something a little bit different than fleet tracking technology. What we’re going to talk about is technology
that has come to the forefront in the news lately, and it’s really about securing your business. We’re not only interested in your fleet, but we want to see your overall business flourish and in the future we hope to bring you more business related products and services that will just help you grow your business and make it a more profitable business.

So the topic today is actually IT security. There are some things that we have done internally to improve our security
and these are the same types of things that most small to medium businesses should be doing as well.

Now if you’re in a bigger organization you probably have IT staff that is available to take care of these things for you. You
may hear some things that you’re not doing and you may have to ask your IT group as to why you’re not doing certain things, because these are pretty basic you know type security measures that should be implemented.

So the very first one is two-factor authentication, and if there’s anything that’s going to help you avoid getting hacked – and it’s the easiest thing to do – two-factor authentication is it. You can receive an email, an SMS, or you can use the authenticator app to get a code which then allows you to enter that code to
then access sensitive areas of your organization or to sign in to perhaps you know a company resource like SharePoint or something like that. It is a very very simple way of doing
things.

And with all security there’s a trade-off. There’s convenience
versus security, and every time that you add more security you’re going to have a little more inconvenience, so you’ve got to realize that in our world today we are just dealing with
things differently. And now when it comes to malware, spyware you know the encryption technology, things of that nature, those things have very, very real consequences. And you can see from the gas, the gas company who is a major organization which would probably or should have had some of the best IT available, they still got caught. So what are you going to do in your small business? And it is just as easy as clicking on something that looks familiar, not paying attention to the destination URL and then you install something that encrypts your hard drive, right? Or, you know, even worse yet it gets into your network and encrypts your network so something like two-factor authentication is a very easy way to put up an initial barrier to that process.

All right number two is only allow computers that are connected to your network through the company to actually
connect up to your resources. And it is convenient for us to allow people to work from home, and use whatever computer computer they may have already in place. It is also inconvenient for employees to have to use a company computer because they probably already have a workstation set up, however, what you cannot do is rely on that computer and that employee to manage their security the same way that you want to manage your business security. Therefore, if you enable the functionality that only a company computer that is registered through your IT department on your network can actually connect to your company resources, you will avoid the holes that are created by employees who may or may not keep up with IT security. They certainly are not going to have the level of security that you would want to have to protect not only your data in your operation, but your customer information as well. And if you happen to be storing you know credit card information or sensitive data then by law you have requirements like this to protect that information. You know if an organization was to steal all your contact information… you know maybe it’s something they could find online, but if they took that list and turned around and sold it to a competitor (and I don’t know about you, but every day I get prompted via email “hey would you like to buy a list from this organization or this industry?” They can take that information and make it available to your competitors and then start calling on your customers. Right? So it may seem mundane for certain types of information but they can do a lot of things with data
that you and I don’t even think about.

So another step is to control what IP addresses can connect to your network. And even if someone’s working from home you can simply type in “what is my IP” you can get their IP address and you can share that with your IT department. The IT department can then configure the firewall to only allow certain IPs to connect. The firewalls have a lot of advanced functionality and you could actually do additional things like only allowing connections during certain times of the day.

So we know that a lot of hacking takes place coming out of
Russia and China and their hours of operation are typically not going to be our normal business hours. By blocking you know network connectivity outside of working hours, you’re going to
remove a huge chunk of opportunity for people in these other countries to hack into your network. Hackers don’t want to go where it’s hard to do things, they want to go where it’s easy. They may probe a lot around different companies and networks looking for these little gaps and then when they
find then they exploit it. If they can’t even touch yours because you’re, you have IP restrictions either by individual IP and or IP and by day and time, then you’ve created a hard surface or a
hard security scenario that they aren’t going to want to waste
time trying to figure out. If they can’t hack it then they can just move on to your neighbor or your competitor who hasn’t
done anything, and they will easily be able to continue on with
hacking.

The next thing is the implementation of Intune. Intune is a Microsoft product and it allows you to protect your data
on mobile devices, laptops, even PCs, but you know a lot of people connect phones, and I do the same thing, I connect my mobile phone to my work. I connect up SharePoint, OneDrive, email, OneNote… All of those things are on my phone, and what happens if my phone gets stolen, right? I’ve now created a pipe from my phone straight into my business. And because authentication has already taken place, if somehow they can get into my phone then they’re going to have that direct
access well. With Intune, it’s an app that installs on these devices, and if you know the the phone gets stolen, or a laptop
gets stolen like we had. In our case we actually had an installer who had a laptop stolen out of the vehicle, and at that time we had remote monitoring software on the laptop and we
were actually able to log into the laptop and we could see the user was, you see their emails and we could see that they were in Africa, it was West Africa somewhere… in the, I think it’s called the Cape Horn area, and we could see what they
were actually typing and things like that, so we sent a little message and consequently we never heard from them
again after that. But Intune allows you to go in and
compartmentalize your company information and lock it down
and uh you know if something gets stolen you can reach out to that device and you can lock that information and delete it off of the device completely. And it’s only affecting business related information and there’s no spyware involved, so your employees don’t have to worry about that. But, you know if something happens you can grab that data and you can delete it off that device and know that your information is protected.

If you need assistance or are interested in Microsoft 365 or Intune, I would recommend checking out IGTech365.com, which we’ll post in the show notes. IGTech365 is an IT company. They handle our IT and they can handle your IT as well. Even if you have the Microsoft Office 365 package today or Business Suite today, they can become your partner of record and it doesn’t change your price or anything else. And once they become your partner of record, then they will actually also provide support that goes along with that. So if you have a question or a problem then you don’t have to call Microsoft. You call IGTech365. They’ll handle it and get on the phone with Microsoft or help you through that. It’s a full service it company, so you can check with them and see what other services they offer as well, from Microsoft Teams as a voice over IP system, which we also use internally – which is great, to the full office 365 Suite.

The next thing is to scan network connections for sensitive
information patterns such as credit cards and social security numbers. That’s a little bit more complicated and a little bit more advanced. Most small businesses aren’t going to do
that, especially if you don’t maintain that type of information, but there are programs that you can put on computers that will scan traffic in and out, and look for patterns of information i.e a social security card number or a credit card number. And when it recognizes that 16 digit number then it flags it and sends that information to Management, so they can look at it and make a determination as to whether or not that’s something that should or should not be happening.

Monitoring you know computer activity is another one. Whether you’re looking at detailed information or just looking at activity. If you see a computer as active during off hours, then maybe somebody is taking control of that computer when you know that employee is not going to be working. So if you saw activity at three o’clock in the morning, and you know it’s a it’s an administrative position that would never have a need to work at that time frame, then you can pick up on that and go in and take a look and see what’s going on.

Something as simple as locking your screen, and you may not know this but if you hold down the windows key and hit the L key at the same time, it’ll actually lock your computer, which is a very easy habit to get into when you’re walking away from your computer. Even in your house, you know you have people coming and going in your house, maybe a cleaning service something of that nature, and if you walk away from your computer and all of a sudden you know your computer is opened up and you leave the house to go walk the dog, there’s nothing preventing someone from getting on your computer, taking a picture of your computer, things of that nature. So getting in the habit of locking that screen and putting an auto lock on that screen after let’s say five, ten, thirty minutes of no activity is a great way to help lock down the computers and avoid you know that type of intrusion that you might not think happens, but it’s totally possible.

The next thing that we did is we updated our password policy. And changing your password every 30 days is just not practical. Everybody hates it it’s, that is a sacrifice that I don’t want to make, but what we can do is make the passwords more complex, and we can make them longer. We can require capitals and lowercase, and special characters and some number combinations, things of that nature that are going to make the odds of it getting hacked pretty, pretty low. And once you do that, then you know maybe change your password once a year type thing is what you want to do. IT people are going to have a different you know opinion on that, but if you do that in conjunction with two factor authentication, then you’re going to have a pretty secure login process.

And the last thing is taking advantage of the you know the employee background checks these days who is actually getting into your systems. Who are you hiring are they the right
people? So there’s a personal security protection that you need to be looking at. There are so many online services today that can run background checks for you to make sure that the people that you are, that you’re hiring are the right folks, and the people that you can trust to handle certain types of sensitive information. And what you don’t want to do is have information that walks out your organization. A platform like SharePoint, which is part of the Microsoft 365 platform, can also monitor for downloads of files you know large quantities, if files are being deleted it can monitor that. It does keep a recycle bin for you and a version history for you which is great, and again if you want some help with that and you want to learn more, IGTech365 is the company to call.

You know so there’s protections in all these different areas that you need to be looking at and they’re just so, so simple that there’s no reason why you shouldn’t go about making some of these changes. But these were just 10 things that I came up with as a small business that would make sense for your business whether you have two people, right? If it’s not family still you know some of this stuff you want to do regardless, even on your personal computer. But if you have two people and they’re not all family then that’s when you should start this practice. And if you have it implemented when you hire people then it’s much easier than to implement after you’ve got you know people that are that are hired and used to doing things the old way, right? Because change is always difficult.

So that’s what I have for you today. I hope you enjoyed, I hope you got some tips. If you enjoyed the content, hit the like and subscribe button down below, and we will see you on the next video. Good luck growing your business and stay profitable!

IT Security Top Ten List

  1. Implement 2-Factor Authentication.
  2. Only allow resource access to computers that are connected to your network.
  3. Control what IP addresses can connect to your network.
  4. Only allow connections during certain times of the day.
  5. Implement Microsoft Intune or a Mobile Device Management (MDM) service
  6. Scan network connections for sensitive information patterns.
  7. Monitor computer activity.
  8. Lock screens when not at your computers. (Windows + L key)
  9. Update your password policy to be 8+ characters, numbers and symbols.
  10. Require employee background checks.
Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

Fuel Economy Benchmarking

The Fuel Economy Benchmarking Experiment

The fuel economy benchmarking experiment allows you to analyze your fleets fuel economy based on real usage and calculate potential cost savings using the calculator. The knowledge gained from benchmarking lays a solid foundation for decision-making. Measuring your performance against the other fleets can lead to opportunities for improvement.

In the past, benchmarking has been a challenge, especially for small fleets, because they were not able to connect to the incredible amounts of data needed for accurate comparison. Geotab has assembled that data and made it accessible through this experiment alongside your current vehicle data.

After installing Analytics Lab, go to the Fuel Economy Benchmarking experiment and click try it.

What can I learn from the Fuel Economy benchmarking experiment?

First, in this experiment, you can easily view vehicles based on poor, average, and good categories for further analysis. It also displays vehicles based on your top performers and worst performers.

Additionally, by drilling into the groups, you can see more details on your vehicles. You can even select alternative vehicles to compare them to.

Finally, the fuel economy benchmarking savings calculator allows you to input a comparison vehicle and fuel cost. By adding more vehicles to the list you can see the result of replacing a group of vehicles that you choose.

What are some practical applications for my benchmarking results?

With this tool, when it is time to buy new vehicles, you can more easily see which are your best candidates for replacement. Even better, you can easily research what to replace them with. It will also help to identify drivers that are getting below the expected fuel economy for the vehicle they are driving. Ultimately, those drivers can be monitored for the wasteful driving habits that contribute to their higher fuel consumption.

Geotab technology brings immediate insight to your doorstep. As soon as the connected device produces the data, it can be aggregated and benchmarked virtually in real-time. By revisiting this experiment after driver behavior has been addressed, or vehicles have been replaced, progress can be easily measured.

What’s next?

Did you find fuel economy benchmarking to be a useful tool? Keep an eye out for our next Analytics Lab post on the API Explorer.

Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing
Vehicle & Asset Telematics
Electronic Forms
Mobile Viewing
Routing

Some Statistics Regarding Roadside Inspections

Understanding Roadside Inspections

Most drivers dread having to deal with a roadside inspection. That dread is well founded when you consider that the drivers career is on the line every time he faces off with a DOT inspector who is just doing his or her job. Being able to anticipate what inspectors are focusing on can be a great help.

We recently found a web page that contains interactive tools that can really give the driver an edge. It contains statistics regarding roadside inspections that are searchable by state, violation type, vehicle weight, fleet size and much more. For instance, if you are going to be driving in Arkansas, you can do some quick research to see how many inspections are being conducted and what kind of violations are being cited.

FYI, Arkansas was picked totally at random, we are not picking on them.

Roadside Inspection Activity

The chart below shows that in 2020 in Arkansas there were very few Federal Inspections, but State enforcement officials were very active. About 25% of inspections are full inspections, so best to make sure my logs and inspection records, as well as my vehicle, are in tip top shape.

It also looks like the Federal inspectors were a little more stringent with drivers than local enforcement, but local enforcement was much more stringent regading vehicle infractions.

Driver Violations

Looking at the top 3 driver violations cited, it would seem that most violators were pulled over for a relatively minor speeding infraction of 6-10 mph over the speed limit. Common sense tells us that obeying the speed limit while driving in Arkansas is its own reward.

Vehicle Violations

Now that you have been pulled over for driving 7 mph over the posted speed, you can bet the inspector is going to check all of your lights and not miss a thing. Inoperative turn signals and lights will have you taken out of service in Arkansas.

Monthly Trends in Roadside Inspections

Understanding the roadside inspection trends by month can also be very interesting. From the chart below we speculate that after the initial COVID 19 shutdowns either enforcement was staying home or drivers were. It would be interesting to dig deeper to see if this is actually a seasonal trend based on some other factor.

Information is Power

Understanding the trends based on the factors discussed is certainly interesting and give drivers an edge, BUT nothing takes the place of constant vigilance when it comes to vehicle and driver safety. Our goal is for every driver to arrive home safely after every trip. No exceptions!

Green Fleet Dashboard to Visualize Your Changing Environmental Impact

Green Fleet Dashboard – Free Marketplace Add In

The Green Fleet Dashboard is one of Geotab’s latest innovations. It is a free add in available from the Geotab Marketplace. Have you seen it yet?

This add in displays a fleet’s efforts to reduce their environmental impact. It helps fleet managers to visualize their progress with improving fuel economy and reducing emissions. The dashboard provides key metrics on fuel useage and driving behaviors, that provide quick insight into how well your fleet is performing, and flags opportunities for improvement.

Green Fleet Dashboard

Green Fleet Dashboard Features

  • Monitor your fleet’s monthly and yearly average fuel economy
  • Track monthly and yearly emissions
  • Track key performance indicators related to fuel efficient driver behavior, including:
    • idling time
    • speed
    • harsh acceleration and braking
  • Highlight best and worst performers
  • Compare your fleet’s performance with fleet industry benchmarks

The Green Fleet Dashboard add in provides you with exceptional visual information. The graphics are easy to digest and keep you focused on achieving your green fleet goals. What a great tool to stay focused on reducing your environmental impact!

Below are some examples of the charts and graphs the Green Fleet Dashboard delivers.

Installing the Green Fleet Dashboard

To install the add in, simply log into your Geotab account and select “Marketplace” at the bottom of the main menu. Once in the Marketplace, begin typing “green fleet” into the search bar until you see the Add In listed. Click on the add in logo, then click install on the next page. Once installed, you will see the new dashboard in your Geotab menu. Easy as 1-2-3!

Just click to expand the images below.

1

2

3

Vision Zero and How Telematics Can Help You Get There

Vision Zero and Telematics

Contributed by Kim Thoman

In this segment we will discuss Vision Zero and how sophisticated and affordable telematics solutions can help you reach your goals. First it is important to understand what Vision Zero means and how it works.

Vision Zero is a strategy to eliminate all traffic fatalities and severe injuries, while increasing safe, healthy, equitable mobility for all. First implemented in Sweden in the 1990’s, Vision Zero has proved successful across Europe. It was officially introduced in North America 1995 and is quickly being adopted across many cities in the United States. Among these cities are Seattle, NYC, San Francisco, Washington D.C., Boston and many more. Even closer to home Orlando, Tampa and Hillsborough are implementing Vision Zero goals.

Where to Start

The question is what tools are needed analyze the data involved with traffic fatalities. Information that is important to study is traffic patterns, traffic light coordination and timing, occurrence of collisions and the ability to highlight hazardous intersections to name a few. NYC’s Department of Citywide Administrative Services (DCAS), for example, adopted telematics to encourage safe driver behavior in its very large municipal fleet. In an effort to make change DCAS uses collision reporting data to better understand the occurrence of collisions. This allows them to better modify safety training, evaluate roadway conditions and assess the efficiency of street improvements and projects for all road users. Another benefit of telematics for DCAS is the reduction of costly lawsuits and process that consume valuable resources.

Vision Zero Results

NYC’s Department of Transportation (DOT) also implemented the same telematics solution in the agency’s 35,000 fleet vehicles to analyze the speed within the fleet and the quality of pavement. In NYC, telematics has contributed to a reduction in fatalities two in 2018 compared to eight in 2014 as employees engage in safer driving behavior.

We live in an era of Big Data. Telematics can optimize smart transportation. Aggregate data allows cities to closely monitor traffic flows, understand the effects of new projects and speed reduction programs as well as assess the efficiency of traffic signals, map air quality and highlight hazardous intersections. These are all tools to better manage the city’s transportation system as a whole.

Vision Zero

More Benefits With Less Effort

By combining air quality sensors with telematics solutions, city vehicles have the ability to measure air pollution without changing their regular routes, according to the Environmental Defense Fund (EDF). Air pollution data is collected by stationary air quality monitors placed miles apart. This has been proven not to be the best solution as studies have shown that air pollution levels can vary greatly from one block to another.

By installing mobile monitors on fleet vehicles could allow a city to cover more ground. According to the report, a fleet in a small or medium North American city could map 50% or more of the city with 10 vehicles, and almost 80% of the city with 20 vehicles. In Washington, D.C., where only five stationary air pollution monitors are installed throughout the city, the top 20 public vehicles covered nearly 70% of the city in six months.

The Future of Vision Zero and Telematics

Vision Zero is not a slogan, not a tagline, not even just a program. It is a fundamentally different way to approach traffic safety. That being said, implementing a successfully proven telematics solution is an invaluable tool to help cities across North American reach these powerful safety goals.

Contact Fleetistics today for a consultation.