
1.   Anti-virus was disabled on all the devices. Windows Defender is  included with the Windows operating system and is installed by default. 
             
             Action  Items For You
             
             ☑   Windows Defender is not adequate protection because  it is still reactive protection. That means it relies on previously discovered  viruses to block them on your devices. Proactive protection uses machine learning  to continuously detect and block potential risks before they become known.
             
             While Defender is becoming more proactive, there are more widely adopted  advanced endpoint security solutions available. We installed the proactive  protection we use ourselves on “Sam’s” equipment.
  
  ☑   If you are going to continue using Windows  Defender, make sure it is enabled. 
  
  ☑   Confirm it is enabled from time to time.  Undiscovered malware on a device can turn this protection off, and you won’t  know it.
    
  . . . 
  
  
  2.   Windows updates had not been applied since 2019. This is a  basic security housekeeping practice you can't afford to overlook. Windows  releases patches in response to vulnerabilities in the operating system and  known attacks.
  
  Action  Items For You
  
  ☑     Confirm that your servers, desktops, and  laptops are configured to automatically install updates. Don’t rely on doing it  by hand when you have time. You know what will happen.
  
  ☑     If you have an internal system administrator  or an outsourced IT provider, they should implement a group policy that enables  this feature and prevents individual users from changing it.
    
  . . . 
  
  
  3.   There were no login passwords on the desktops. There isn’t much  more we need to say about that.
    
  . . . 
  
  
  4.   The company’s domain name was registered to a third party. It  is not uncommon for your website developer to register your domain name for  you. 
  
             However, your domain name is a valuable company asset that you need to retain  ownership of. When a third party is the registered contact, they can control  the ownership of your company’s domain name.
  
  Action  Items For You
  
  ☑     Do a whois (https://www.whois.com/)  lookup on your domain name. There are 3 contacts: registrant, administrative,  and technical. We recommend that your company be listed at least as the  registrant and administrative. If your company is doing the technical  development, then you will be the technical contact as well.
  
  ☑     Never use an employee’s name or email  address as any contact.  The risks should be apparent.
  
  ☑     Always use an officer of the company for all  contact information.
  
  ☑     As a standard practice, we recommend using  an email alias instead of a single person's address. An alias doesn't have an  email inbox. Instead, it is a address that forwards all emails to one or more  actual email address in the company. If one person leaves the company, then  others in the company are still in the email communication loop. 
  
  ☑     Check the expiration date for your domain  name. If you are not the administrative contact, you will not receive renewal  notification. Once your domain name has expired, it is available on the open  market for anyone to purchase.
    
  . . . 
  
  
  5.   Neither the web developer nor the IT support provider has a secure website. Having  an SSL certificate on a website has been standard practice for several years.  It communicates to the website visitor that the company takes security  seriously. 
  
  Action  Items For You
  
  ☑     Make sure that your IT service providers  have a secure site. It simply means they’re paying attention to basic security  practices. A website – and providers -- without an SSL certificate should be  avoided.
    
  . . . 
  
  
  6.   Both the web developer and the IT support provider are home-based companies. First,  this isn’t a criticism of where a business chooses to operate. These are simply  some perception points that need to be considered.
  
  Action  Items For You
  
  ☑     Google My Business is a way for companies to  claim their business with Google. You earn a visible position in the top right  corner of the Google page when your company is found in a search. 
  
  ☑     Google also searches for and displays a  photo of your business. When your home address is listed with your Google My  Business account, then your home is the photo people see. A modest single  family home with 2 cars in the driveway, overgrown grass, and a garbage can at  the curb might not project the professional look you're going for.
  
  ☑     The Google account for "Sam's" web  developer has a prominent red “Temporarily Closed” sign. Remember, these are  the folks who host our client’s website and own their domain name. The domain  is expiring in 3 weeks.
    
  . . .
 Linda Rolf is a lifelong curious learner. She is fueled by discovering the unexpected connections among technology, data, information, people and process. For more than four decades, Linda and Quest Technology Group have been their clients' trusted advisor and strategic partner. They actively contribute to each client's success through mutual collaboration, thoughtful business analysis, enterprise software development, technology integration, database design and management, opportunity discovery, business growth strategy, and marketing initiatives.
Linda Rolf is a lifelong curious learner. She is fueled by discovering the unexpected connections among technology, data, information, people and process. For more than four decades, Linda and Quest Technology Group have been their clients' trusted advisor and strategic partner. They actively contribute to each client's success through mutual collaboration, thoughtful business analysis, enterprise software development, technology integration, database design and management, opportunity discovery, business growth strategy, and marketing initiatives.