Here’s Why Your Part-time I.T. Person Is Not Going To Cut It

We meet with organizations every week that tell us they have a “part-time” person that takes care of their I.T. and technology needs and that they feel like they do a decent job. What they normally mean by this, after asking a few more questions is they have a person that is tasked with maintaining their technology because they have a technical inclination but they also have other job responsibilities as well. Further-more, what the mean by “they do a decent job” is that they keep things up and running for the most part and deal with all the questions and problems that relate to I.T. As we start to ask some more detailed questions about their operations, it becomes clear there is a big misconception about what it means to fully cover I.T. needs and an even bigger misconception about what it means to do a decent job with this.
I’m here to tell you once and for all, – If you have more than a couple of employees that use technology and you only have someone looking after I.T. needs part time….. not only are they not able to do a decent job, but your organization is at SERIOUS risk.
Now that I have you on the defensive, let’s back up and understand what is really required for I.T. and technology management for any organization with more than just a few users.
What most organizations do when it comes to I.T. management
End-user support – Ok this is probably what everyone thinks of when asked about how they manage I.T. today. Obviously you have to provide some sort of support for technology problems and issues. Most of the time this is the one area that organizations will say they are OK at. This boils down to that if they have a person taking care of technical support, most likely they are at least agreeable enough to keep in that position and can communicate effectively. This is at the basic level what most organizations have come to associate I.T. with and unfortunately is where a lot of organizations stop when it comes to I.T. responsibilities. The majority of the time as well, there is no accountability or tracking of how many issues are occurring across the entire organization. So the end result is that when asked how often there are issues, the person responding typically can only speak the issues they personally have. The challenge here is that if the person responding only have 1-2 I.T. issues a week but there are 20 employees, that could actually equate to 40 issues a week across the entire organization.
- Antivirus – 10 years ago, getting everyone to buy-in to the necessity of antivirus software was the biggest challenge for most organizations. Unfortunately a large majority only rely on antivirus as their approach to security and even with that, there is no consistency in strategy, software, updates, policies and enforcement.
- Firewall – It is rare(but it still happens) to find an organization today that does not utilize a firewall to protect their internal network from the internet. However what we find quite often is that an inappropriate firewall is in place, meaning one that is meant for home-use or does not provide advanced firewall features needed to protect against today’s security vulnerabilities. Additionally most organizations do not apply any type of updates to their firewall on any type of scheduled or regular basis which means a large number of vulnerabilities could be getting through.
Here is what organizations need to be doing with I.T. and why a part-time person simply can’t keep up with it.
- Antivirus – While antivirus software and a firewall are a start to security, there are many additional items that need to be included and applied. First of all antivirus software needs to be more than just the old-fashioned variety that relies on a static list of definitions. Newer antivirus software can analyze behavior and in some instances can leverage artificial intelligence to predict what may be happening and take action. But the antivirus software has to be actively managed and be consistent which requires a scheduled and intentional approach.
- Firewall – Again this is another area where the old approach of buying a firewall, configuring it during install and not touching it again until it is time to replace it will be ineffective in today’s riskier environment. A modern firewall will be one that actively adapts to threats on a daily basis. This means it needs to be a more advanced(and most times a little more costly) solution. It needs to be actively managed as well, meaning is it being updated on a weekly basis, is it being monitored for alerts, does it have automation setup to handle threats as they occur and does it also talk to the endpoint protection(antivirus software) so that it knows when there is a issue occurring on the inside of the network.
- End-user training – The biggest security threat to any organization is their internal users. In fact over 95% of ransomware is spread by users internal to the organization. Without ongoing and consistent training, end-users cannot recognize obvious indicators of threats and inevitably will click on, visit, or act on the mechanism designed to do the damage.
- Security Policies and Procedure – Second to end-user training, the next biggest threat is poor security policy and procedure. Most users use the same password across multiple sites and platforms. If there is not a formalized way to regularly rotate passwords, enforce complexity, and ideally utilize more advanced security approaches like multi-factor authentication, organizations are at a huge risk of being compromised by valid and legitimate user credentials. All Cloud based services and applications(especially Office 365) should also be included in this to insure proper security is enabled.
- Auditing – At least on a monthly basis there should be an audit of the environment. This involves scanning the internal network for vulnerabilities, scanning the firewall externally for vulnerabilities and open ports, and reviewing security logs for any anomalies and/or security events. If your organization takes credit card payments, or is subject to HIPAA regulations you should be conducting specific audits for those areas as well.
- Monitoring – Once all security measures are in place and are regularly reviewed and updated, the next step is that there needs to be an actively practice of monitoring all elements. What this means is there needs to be a process to monitor all security devices, services, and components for potential security events on active basis. This needs to be consistent and monitored 24/7/365.
In Conclusion
Most small businesses and small organizations think they are too small to need a structured focus on technology and I.T. In fact, many of the organizations we meet with tell us that they are “too small to really have any need for I.T.” and thus in many cases tell us that they have someone that takes care of the I.T. needs as just part of their other job responsibilities. As you can see from the list above, the needs to cover from and I.T. perspective have grown exponentially over the past few years and it is only going to get worse as security threats become more common and more impactful to operations. Even larger organizations that have multiple dedicated I.T. staff are having trouble keeping up with all the demands to secure I.T. and increase efficiency. So it is highly unlikely that a part-time person can effectively handle I.T. needs even in the best of circumstances.
Organizations that do not take this seriously are at the biggest risk of data loss, security breach, and operations to be impacted negatively. In fact it is not out of the question to say that unless there is a dedicated approach to addressing these concerns there is a very high likelihood that it is not a matter of IF an issue is going to occur, but a matter of WHEN and HOW BAD WILL IT BE?