All Services

From back-end infrastructure to personal productivity, Ergo has the knowledge and experience to match technology to all our client requirements. Our strength is understanding your business. The end goal is always the same, to make businesses more agile and competitive.

More About Our Services
Managed Services

Focus on your core business and leave ICT operations and management to the experts. From 24/7 service desk support to managing hybrid clouds, Ergo have the depth and experience to meet the most demanding service level requirements and ensure continuous improvement. 

More About Managed Services

Highlighted Services

Managed People

Competition for talented technology professionals is huge, which is why we make hiring more personal, taking time to match the right people to the right roles. Our technical experience and recruiting know-how help find the perfect fit for both parties.  

More About Managed People

Highlighted Services

Consultancy Services

Speed of change demands a new generation of digital investments that will drive business enablement and profitability. We support IT leaders, wherever they are on their digital transformation journeys, with our digital assessment methodology. 

More About Consultancy Services

Highlighted Services

Print and Document Solutions

Our goal is to deliver the best possible print and document service for you, leveraging the latest technologies and innovation to ensure the performance of your print environment is optimised to maximise employee productivity.  We take out costs, add efficiencies, wrap it in end-to-end security and make print integral to digital transformation. 

More About Print and Document Solutions

Highlighted Services

Cloud

Agility is key to business success and the cloud is where to get it. We offer a wide range of cloud services – public, private, hybrid – and provide the best of both worlds by integrating or migrating legacy systems to streamline the way your IT is consumed. 

More About Cloud

Highlighted Services

Digital Enablement

Ergo provides a clear roadmap for digital transformation with practical steps to make businesses more agile and customer-centric

More About Digital Enablement

Highlighted Services

Mobility and Collaboration

Ergo has provided many of Ireland’s largest organisations with an ecosystem of mobile applications and collaboration services that drive productivity without compromising on security

More About Mobility and Collaboration

Highlighted Services

Software Licensing

Businesses struggle to manage software assets and don’t always get the best value. We can help streamline your software purchasing, simplify deployments and maximise your investments. 

More About Software Licensing

Highlighted Services

Security, Risk and Compliance

Risks around cyber security and data protection are an ever-increasing challenge for businesses. We provide security lifecycle management, from perimeter testing and threat analysis to mitigating the impact of a breach. 

More About Security, Risk and Compliance

Highlighted Services

Microsoft Technology Specialisations

With the largest team of Microsoft IT professionals in Ireland – including two Most Valuable Professionals our expertise spans a comprehensive portfolio of products/services

More About Microsoft Technology Specialisations

Type your query and press the "Search now" button

How to reduce the risks faced by your company

How to reduce the risks faced by your company

How to reduce the risks faced by your company
Return to News

How to reduce the risks faced by your company

IT Security Officer at Ergo, Nikos Vasileiadis, discuss security approches with the Sunday Business Post and why you should adopt a culture within your workforce that focuses on a multi layered security strategy.

It can sometimes feel like your company is more exposed than ever, but reducing this is a matter of knowing what to prioritise.

If anything, security is a multi-pronged approach. You can’t assume that one piece of technology or process will keep you safe from threats. In fact, businesses now have more things to take into consideration than ever before.

There are three issues in particular that stand out for Nikos Vasileiadis, IT security officer at Ergo: automated tools, how connected devices are, and companies’ perception of threat.

“[The first] is automated tools which make it easier to attack,” he says. "Botnets have become really cheap so you can rent one for a few dollars [to attack for a couple of hours]. There are a few DDOS services over the internet and you can rent those services and bring down a competitor's website, and it's really cheap.”

“Almost every device right now is connected to the internet in some way, so that's another threat factor. Anything can be hacked and used as a botnet, and it's almost every device you can imagine.”

For the third point, detection and being proactively neutering threats are becoming more important as time goes on. With the rate of attack  speeding up, there isn’t much space to be lackadaisical about it.

“Companies themselves either don't identify the risks, or they identified ones but they don't know what to connect and there is no clear plan of action here,” says Vasileiadis. “If they’re hit without realising it, within this time, their company’s intellectual property might be gone, there could be financial damage, legal damage, anything can happen within those few days, until you identify what really happened.”

Vasileiadis advises businesses to take a couple of steps. The first is to identify the risk: if you know what you’re dealing with and can deal with them from most urgent to least, you’ll be in a much better position than most.

Once that is done, he then advises businesses to qualify the potential exposure if something was to be exploited. For example, if your firewall is breached, that might mean your intellectual property is at risk, which will cost you a significant amount of money.

Doing this will put you in a better position to tackle the problem and figure out the best approach to take.

“If you do that, then the course of action is pretty clear,” Vasileiadis explains. "You will implement countermeasures and, if not, accept the risks. [Ask yourself] what your potential exposure is and what could cost you, if the damage in the long term is way more than you would expect.”

Tying in with that process are the security controls needed to keep on top of things. It’s very easy for something like malware or a data leak to create major problems and if you don’t have the right controls in place, such problems can spread faster and further than you might even anticipate.

As Vasileiadis mentioned earlier, more and more devices are connected to the internet and if you take the average business, that means there are significant numbers of entry  points – devices, platforms, apps, websites, servers and services – that have access to a business at any one time.

Security controls can at least help you keep a lid on things. One of the best ways is to take a certified security standard and incorporate it into your own business.

All businesses are different, but that doesn’t mean you shouldn’t look at them. Vasileiadis says that even if they aren’t a perfect fit, there will still be elements from them that you can incorporate into your own business and start meeting security standards. 

“What I always advise companies to do is just pick up a framework. There are quite a few standards and frameworks out there like ISO 27001, and the Information Security forum,” he says.

“All of those have some guidelines, some rules, some processes, so any company can pick up a framework that is most relevant to what they’re doing.

“Each framework has its own unique set of rules like anti-malware for sorting out all the devices or making sure that there's a security hardening (the process of securing a system by removing as many vulnerabilities as possible) in all our servers. You get something tangible if you know your targets.

“No framework will ever eliminate the risk, but at least you can bring the risk down to an acceptable level and that's a huge point.”

No matter what time it is, businesses will continue to face multiple threats from different places. Keeping up by implementing the measures needed can feel like a relentles task, but what Vasileiadis
advises is that both internal and external teams will need a framework to follow.

If you’re getting outside help, be aware that their perspective will be different than whoever is on your internal team. That can be a benefit, as both external and internal teams can compare and contrast notes, and may spot things the other team might not have realised.

Want to hear more? Talk to us here.
 

News and Blog Posts

Driving Office 365 User Adoption: 5 Steps to Building a Champions Program
Brian Moran
03 July 2018 • Posted By Brian Moran Training And Adoption Lead

Driving Office 365 User Adoption: 5 Steps to Building a Champions Program

In my last blog (8 Steps to Increase User Adoption of Office 365), I outlined the steps involved in succeeding in taking...

Read now
Turning Data into Insights: 3 Steps to Growing Your Digital Business
Jimmy Sheahan
28 June 2018 • Posted By Jimmy Sheahan Managed Services Managing Director

Turning Data into Insights: 3 Steps to Growing Your Digital Business

To run a business, one must make decisions. To run a good business, one must make good decisions. To run...

Read now
Ergo and Micromail Scoop Two Partner of the Year Awards at Microsoft Inspire
News 20 July 2018

Ergo and Micromail Scoop Two Partner of the Year Awards at Microsoft Inspire

Read Now
Ergo and BWG: A Winning Combination
News 15 June 2018

Ergo and BWG: A Winning Combination

Read Now
Managed Print Services: The Need For A True Partnership
News 05 June 2018

Managed Print Services: The Need For A True Partnership

Read Now

Subscribe to Our Blog

Scroll to Top