10 BASE-T/100BASE-TX Ethernet Extender over VDSL
TECHNOLOGY CONSULTING SERVICES | |||||||||||||||||||||||||||||||||
Technology Consulting Tips |
|||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||
|
Network & Internet Security Is your network secure? What about the configuration parameters of the gateway that lead to the outside world? Will your Intranet (Internal Network) be vulnerable? Are your end users abiding by the policies provided by the IT team and management? These are some of the questions that CEO's, CIO's, IT Managers, and ALL "MIS" members will be confronted with at some point in time. You may ask the question, secure from what? Well there are several threats that are quite serious to a company or organization that are directly related to the IT team. We will cover some of these threats in a few lines down. All of which, can be quite damaging to the company's reputation, market positioning and possibly "financial" status. Let us take a look at some of these threats: MALWARE - What is malware? I know we all heard one time or another about spyware, trojans and computer viruses. Well to put it simply, these are what we call Malware. Malware developers, always work to protect their products against antivirus software companies i.e.. Symantec (Norton Antivirus), MacAfee etc. This is an ongoing battle between the malware developers and the antivirus companies. Once the software vendors update their software, then the malware author or developer will supply a new version. This goes on and on. Hence, it is rather imperative that your company is up to date at ALL times with the latest antivirus patches, DAT files etc. Why is malware created? Who typically creates them and how is it spread? Well to further answer these questions, let us take a look at what one malware expert had to say. "Malware meaning computer viruses, trojans and spyware is about money. The teenagers who created the viruses have grown up and they are trying to make money. The shadow Internet economy is worth over $105 billion dollars. Online crime is bigger than the global drug trade. There is a sophisticated online black market with tens of thousands of participants. Collectively, online criminals are using the techniques of the free market to subvert and corrupt legitimate online business." "Malware developers uses the services of a botnet owner to spread it. A botnet owner is a remotely-controlled network of computers infected by a virus. Typically, they are poorly protected computers belonging to innocent people around the world. You may have a bot running on your PC now and not know it. These computers give botnet owners the computing horsepower and network connectivity to spam out millions of emails or send out hundreds of thousands of trojan attacks or host a malicious website. Once the malware has spread, the middleman can sit back and start to collect stolen information and identities." Maksym Schipka - Senior Architect at MessageLabs
Ten ways hackers can breach your Network Security 1. Stealing passwords 2. Trojan Horses 3. Exploiting defaults 4. MITM attacks - (Man in the middle) attacks 5. Wireless attacks 6. Doing their homework 7. Monitoring vulnerability & research 8. Being patient & persistent 9. Confidence games 10. Already being on the inside
Ten steps to securing your Network 1. Trojan HorsesA. Policy focuses attention B. Policy drives up compliance C. Policy enforces fairness D. Policy facilitates prosecution 2. Fine tune the policy When it comes to policy, one size does not fit all. Your policy should reflect the way you do business. 3. Attack spyware from multiple angles A. Stop it at the gateway B. Stop it at the desktop C. Stop it "calling home" 4. Block undesirable URL's Millions of dubious websites spring up daily. You can't keep track of them all.. 5. Smash "container" file types into bits An innocent looking spreadsheet can carry a virus. A presentation can carry spyware. A zip file can contain any number of files that might infect your network. 6. Watch your uploads Companies that defend against hazardous web downloads are often completely vulnerable to threats going in the reverse direction. 7. Protect or (block) your IM traffic Your policy will determine if this is allowed or prohibited. Either way it should be monitored. 8. Monitor ALL web activity That which gets measured, gets managed. 9. Simplify the policy enforcement Web security can eat up entire IT departments unless you simplify, automate and streamline. 10. Keep an eye on emerging web activities Blogs, forums, social networking, P2P file-sharing - it's all exciting stuff ; but it opens up new windows of opportunity for the people and organizations that make money from exploiting loopholes. Click here to visit the ICSA labs site where you can view a list of approved and tested firewalls that meet the industry standards. Small and large businesses alike, should ensure that their firewall meets these standards. DATA CENTER TIP - How cool is your Data Center? A Data Center should be climate controlled keeping the room at a constant 65 degrees with less than 50% relative humidity. This can be accomplished with redundant 20 ton commercial class A/C units; if the Data Center measures approximately 1,500 or more sq. ft. Product HighlightsFor more information on how it works, click here. Digital And Computer Forensics
The Need For A Computer Examiner - Forensic Specialist In a court of law, an expert is one who is deemed to provide a Qualified Professional opinion on a particular subject matter. A Computer Examiner who is "Certified", should definitely qualify as an "expert witness" in a court of law while providing valuable testimony. Whereas, other computer professionals do not qualify because of their non experience in the subject matter. If for some reason, you need to have an investigation done on a PC or PC's across the network, please ensure that the investigator is one who's opinion would be "qualified" or accepted in a court of law. Examples of when a Computer Examiner can be of assistance An example of how computer forensics is affecting the current workplace is the aspect of security. Employees' work computers are now being monitored to ensure no illegal actions are taking place in the office. They also have heightened security so outsiders cannot access a company's confidential files. If this security is broken a company is then able to use computer forensics to trace back to which computer was being tampered with and what information was extracted from it, possibly leading to the guilty parties and other potential parties involved. Protect Your Confidential Data - Data Protection Act (DPA) 2003 In a business environment, there is lots of data transferred on a daily basis. Most of the data being transferred has lots of confidential information pertaining to clients or the businesses themselves. How can you the client be sure that information collected from you by the various establishments are properly secured? Click here to find out some questions you should ask businesses with regards to your private information that they have collected to be certain that it is secured. Shopping for a PBX Telephone System In today's world, technology is all around us and each and every year it becomes better and better. Gone are the days of the old antiquated analog home and office phone systems. We are now living in the days of the digital phone systems with all of the dialing and messaging features. To add to this ever so wonderful technology, is the advent of the IP telephony solution. Having an IP telephony solution allows you to now connect your telephone over the internet through your LAN or WAN to say, a branch office. One big advantage of IP PBX or a VoIP solution is its low cost of operation. Since the calls make use of IP networks, even long distance international calls are many times cheaper. If the call is made between the phone systems that links the branches of enterprises, it is absolutely free of cost. ISEBahamas specializes in the smaller PBX telephony systems for small offices and homes; with brand names like Fortivoice 3CX and Panasonic.
Things to consider when purchasing a PBX phone system 1. How many users altogether will need to be serviced by the PBX system and is there room for expansion? 2. Will these users be situated in one building or in separate buildings at separate locations? 3. What percentage of the calls will be local as opposed to international or long distance? 4. Do I have a fax machine that may also need to be connected? 5. Will I have a receptionist, or will I need an automated attendant to answer and distribute the calls accordingly? 6. Would I need to have my voice messages sent to me by email or some other means of communication such as a mobile or land line? 7. Would I require music on hold for my customer's listening pleasure while on hold or waiting to be transferred? 8. Will I need to access my PBX system remotely to make configuration changes. 9. Will I be able to retrieve data call records simply without the aid of a technical person.
10. Will the PBX system be VoIP compatible, if it is not so already. Shopping for a CCTV System Have you always wanted to be at home even when you were not at home? Ever wondered when you were travelling away from home, are my kids safe? What about when you and the entire family are away on vacation, did you ever wonder if the house or office was safe or at risk? CCTV systems work great whether for large or small offices, homes, Schools or Churches or any playground or area where you need to monitor activities locally or remotely (offsite).
Some things to consider when purchasing a CCTV system 1. How many cameras do you need to cover the areas necessary? 2. Will you require color video, or will black & white video suffice? 3. Do you need a camera that displays or records video during the night or in a dark area with little or no light? 4. What type of camera will you require at certain areas? There are several types of cameras that may be B&W, color or Night vision: DOME Bullet PAN TILT ZOOM FIXED Professional 5. Will you need a video surveillance system that records the live video images? Is the recorder PC based - Hard Drive or DVD recorder based? 6. Will you need to access the cameras remotely to view the video images either live or pre-recorded? 7. Will you require sound from the cameras? 8. Will you need the camera system to integrate with other security equipments? 9. Will the cameras be connected via cable or is it a wireless camera? Contact us to see if we can be of assistance getting your premises protected today.
Video courtesy of SCW |
|
|||||||||||||||||||||||||||||||
|