Network Security

Blog

sales: 01344 567990

support: 01344 989530

Network Security

  • Human integration with technology and systems.

    Connecting all the time

    Andrés Lucero of Aalto University, Helsinki, Finland recently published ( arXiv:1804.04833 [cs.HC] ) his autoethnography about his period of times in his life that he has voluntarily lived without a mobile phone. Since 1999 he spent two separate periods (2002-2008 and 2014-2017) without a phone. Both related to when he was working in academia and cycling to work. Interesting points to note were that even during these periods he had access to wifi enabled tablets, but the need for authentication codes and secure communications were the key areas that were affected by not having a mobile phone. Additionally in Finland at the age of 7 children receive their first mobile phone and house keys so that they can travel to school on their own.

    With two factor authentication heavily reliant on mobile phones either for SMS/text codes or smart phone apps with authentication code production, it becomes more and more difficult to imagine the operation of today’s work environment without a phone. In one situation the service he was trying to use reluctantly ended up emailing the security details to an email address that they weren’t able to verify.

    Moving back in to the connected world and embracing all forms of device, including wearable, Andrés Lucero also had to learn how to cope with synchronous and asynchronous forms of communication such as Whatsapp, where in a group things are said and discussed through the night which aren’t for people sleeping to respond to until they want to.

    The paper makes for an interesting study, and demonstrates a number of situations where normal life is eased by the power of live connection. Eg. location and travelling directions, location based entertainment and two factor authentication services. The paper also shows how remaining in control of technology can help maintain control of stressors.

    For security all businesses should be using two factor authentication where they can, and with smart phones being one of the most popular methods the need for all employees having access becomes apparent. However there are alternatives, if you’d like to discuss please contact us below.

    #telanovaReporter

  • Stealthy Trojans need the 'door bouncer' treatment on your network.

    No, this isn't a blog post on Brad Pitt. 

    I'm hopeful you've heard of the mythical story of the Trojan Horse? Where, in 1194 BC, the Trojans built a gigantic wooden horse that was disguised as a gift and left it outside the City of Troy's gates. The people of Troy celebrated the peace offering and took the horse inside its impregnable walls. Little did they know, the horse was full of Trojan's best warriors - and at night, they jumped out; opening the gates to the Trojan army where they plundered and razed the city.

    The same ruse is now being used to enter our networks and steal our sensitive data. All it takes is a user to open or download a link sent from a malicious email that is disguised as secure and safe. A study in 2011 showed that a 69.9% of all malware attacks are Trojans.

    Once downloaded or opened, the malware infects your network or local computer. Attackers can then steal data such as credit cards, financial information, email accounts, passwords and emails, and even send thousands of emails to clients from your own email with the same link or file, creating a snowball effect that is hard to stop. Whatever is saved or used on your network is at risk.

    It's a network's Achilles heel.

    Thankfully, whilst Trojans are getting sneakier and craftier as technology gets more complex and advanced, so do the deterrents and prevention we can put in place. These prevention's act the same way as a bouncer at a club; checking ID's and making sure no unwanted visitors get in.

    That's what Telanova is; a bouncer. We monitor remotely and seamlessly in the background, allowing you to get on with the important work at hand without having to worry and lose sleep over network security issues. Contact us to find out how we can protect your network's city walls from attacks.

     

     

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand