Managing Necessary, Healthy Changes

This is Two Minute Tech Tips, I’m your host Lester Steward. In this series we are discussing Business cybersecurity and what you need to know to protect your business.

For a business to succeed it must change and adapt. If the business model doesn’t evolve, then the business is likely to stagnate and close. Cybersecurity is similar. I mentioned in a previous episode that cybersecurity threats are always evolving and if we don’t evolve with them then the business can be vulnerable to attacks. But how do we manage changes without impacting business production?

If you partner with a managed service provider or have an internal IT department, they should have procedures on change management. I have change management meetings several times per week with the NTG staff. It’s appropriate to have a checks and balance system because one person should not have all the power or knowledge on a network and having multiple perspectives will lead to asking good questions about how other systems at the business may be affected by a change or update.

Examples of some changes can look like adding policies on a firewall to create a more secure network, but this could cause issues with applications that use the internet. Change can be adding new users to the network and what privileges or access to files they’re allowed. Change is when you move to a different application to track sales or keep inventory. The resulting impact of these changes could cause business to be delayed and loss of income, not to mention stress on you and the employees.

Change is necessary to grow but make sure it’s healthy, managed change.

If you need any information on this subject, please let North Tech Group know by visiting our website ntgak.com.

On the next episode I’ll be talking about VPNs and the forms they can take.

Thanks for joining me, Lester Steward for your Two Minute Tech Tips, helping you keep safe in your cybersecurity world.

Scroll to Top