Network

tinsleyNET Network Management
tinsleyNET Network Management Services

Notwork

Don’t let your network turn into a notwork. With more and more devices using the network to communicate with each other and the outside world, your network is being put under more and more strain. On an unmanaged network, you’ll soon start to see bottlenecks and network slowdown.

Do I use a network?

Yes. Well if you’re reading this on our website then you are.

Long gone are the days when networks were restricted to large companies and universities. In one form or another, and of vastly different sizes, we all use a combination of private and personal networks today. Making those networks efficient is essential to being able to get things done.

tinsleyNET Home Network Services

In your home, the heart of your network is your internet router, from there you might have WiFi or cable connected devices such as smartphones, tablets, laptops, TV’s, heating systems, Games consoles, PC’s, lighting and so on.

In your business it could be a more complicated network setup involving routers, multiple access points and wider connected elements in different buildings or even different countries.

Network of Networks

Getting your network connected safely to the internet is essential for any business, but many people don’t want the hassle of managing the connection and just want the connection to work. We can manage your gateway device and configure it making sure your private network is protected from the public internet.

Your gateway device should be checking all incoming and outgoing data and destinations to make sure nothing untoward is being sent or received by devices on your network.

Servers

Some people want to micro-manage their servers, others just want them to work. We can configure your servers to work for you, how you want. From online hosted servers, to in-house servers, both hardware and virtual. We can design, install and manage the servers you need to get your job done.

IoT

In an ideal world, internet connected devices should just work. You don’t want a new coffee machine to take 4 hours to setup just so you can make a coffee from your smartphone! But this ‘Internet Of Things’ does still need managing. It might be configuring them to connect to your network or securing them if they have remote access facilities.

Sometimes, if a vulnerability is identified after the product has been sold, the manufacturer will release a software patch, but often these are not applied, we can make sure your IoT is kept up-to-date with security patches as required.

tinsleyNET IT Servces Consultants #WeCanHelp

#WeCanHelp

Whatever size or type of network you have, from your home WiFi and internet connection, to a multi-site MPLS connected company, we can help you manage and protect your data, and streamline your network to make it work better for you.

Anti-Virus

tinsleyNET Data Security
tinsleyNET Data Security

Protecting you from the video nasties…

Back in the 1970’s a ‘neat little self-replicating automata’ was released on the ARPANET (the predecessor of today’s internet) that was called “the creeper“. Not a virus in the way we think of them today, it was more of a test of code and concept, the only ‘payload’ was a line of code reading “I’m the creeper: catch me if you can”. In the following years, code would be written that became the basis of several types of virus; Worms, Trojan, Boot Sector and Malware.

The early viruses were intended to test concepts or as jokes and went out of their way to protect users data. In the late 1980’s that changed, IBM wrote a program to detect the first encrypted virus and clean an infected system, but didn’t release that to the public until a second version of the virus began to spread on the BBS systems of the day. And so began the battle between the virus writers and the anti-virus writers.

Evolving The Virus Business

tinsleyNET Security Services protecting you against Ransomware

Jump to today and we have many different types of computer virus and many many different viruses in each type. Viruses have become big business for criminals, with nearly all viruses designed to generate income for the coder or their superiors. The latest ransomware viruses can generate large payouts by infecting many smaller users, this is a better business model than infecting a smaller number of large companies and helps keep the virus out of the media and so out of public attention.

It’s not just Windows

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts.

Microsoft Windows was the most popular operating system in the 1990’s and as a result it became the biggest target for virus writers. This spawned the urban myth that only Windows based computers could get viruses, but that’s not the case.

The first ‘wild’ virus to spread was purely an Apple-based virus. Apple and Linux based computers have seen a recent rise in the number of viruses intended to infect them. The same goes for mobile phones and devices, Android, Apple’s iPhone and even the old Nokia phones and Windows Mobile are all susceptible to virus infection.

The rise of IoT devices, like smart TV’s, fridges, thermostats and so on have not gone unnoticed. Several recent ‘botnets’ have been shown to be comprised of a large number of infected smart home devices. Hackers have exploited the often poor security on smart devices, and the fact that many don’t get post-sales software updates to take control of them. Often the hackers are after the processing power for attacking other networks or running malware that won’t immediately be noticed by the device owner, though there have been instances of devices being specifically targeted to spy on users, making use of cameras and listening devices.

What should you do?

As an individual you may think that you’re too small to have to worry about antivirus, wrong. It’s a lot easier for virus writer to target a large number of small unprotected users than it is for them to target fewer, better protected companies.

Home users need to consider all the devices on their home network, from computers to smart devices like lights and speakers. These devices are all potential targets. It’s sensible to protect your home network at the point of entry (your broadband) and then further protect devices that can go outside your home network (smartphones, tablets etc) as well as devices that hold particularly valuable information, such as banking information, passwords for any internet accounts, and your photos.

As a company, you should be using a multi-layered security plan with a reputable antivirus application as a part of that plan. You should never use just a single product or technology, as no one product can guarantee 100% virus detection.

A company should look at perimeter and internal security, preventing hackers getting in from the internet and stopping any devices that become infected away from your network bypassing that security.

Data security is essential, both backing up and encrypting the information. Under data security laws you are required to protect any information that could identify an individual (a customer, employee or supplier for example)

tinsleyNET IT Servces Consultants #WeCanHelp

#WeCanHelp

We can design and implement a security solution that suits you or your businesses needs. We can help protect all your IT assets regardless of where they are and how they are used. We can assess your existing data security and give you a report identifying good and bad practices.

Internet Routers are under attack!

tinsleyNET Security Services

Is your home router living a secret double life as a botnet DDoS server?

The number of private home routers being duped into living a secret life as part of a botnet or in serving up malicious DNS results to its users has seen a surge in the latter half of 2016. It’s thought that the majority of traffic in the DDoS attack on various gaming servers in Christmas 2015 was generated from home routers that had been compromised.
Read more

Getting online, Home & Office

tinsleyNET IT | Getting you online

tinsleyNET IT | Getting you online

Home and Office Internet Connectivity

If you’re using your home phone line for internet connection, it’s likely that you’re connected to an ADSL line (Asymmetric DSL)  but there are other variants of DSL that may be available in your area, with VDSL currently being rolled out across the UK offering higher upload and download speeds. Read more