Cyber Security Breaches 2018

Cyber Security Sqr

Cyber Security Review 2018

With only a month to go until the new Data Privacy regulations come into force, we;ve taken a look at the Cyber Security Breaches report released from the Department of Digital, Culture, Media & Sport. Read more

Mobiles, Tablets and BYOD

tinsleyNET Mobile Device Support
tinsleyNET Mobile Device Management

Not just a phone

1980sMobile
Early mobile phones were big, heavy, and only had 20 minutes battery life.

Mobile devices are so much more than just a phone. In many cases, phone calls are the least used feature of a modern mobile. Having access to mobile internet and internet based apps for social media are by far the most commonly used features on them.

Modern smartphones can replace a lot of the functionality of a small laptop, with phone docks giving access to a large HD screen, full sized keyboard and mouse, the ability to hot desk and take your phone/computer with you is making their use in business more seamless.

Tablets

While smartphones have become a ubiquitous accessory on most people, the tablet has taken it’s place as the replacement of the home desktop PC.

Less portable than the smartphone, but with a bigger screen and a familiar operating system they are easy to get to grips with, and with apps like Microsoft Office being delivered over the internet, there’s less and less need for a traditional home PC or laptop.

BYOD

With the emergence of powerful personal smartphones and tablets, users began making use of the new mobility and doing a lot more data processing on their own devices. This is great for productivity but can be a security nightmare, how can you guarantee that the users own device is secure and that any apps they install are not going to steal your company data? And what if the device is lost,  how can you be sure that the user had a secure and strong password, or that company data was in encrypted storage on the device?

BYOD (Bring Your Own Device) is one of the most popular ‘your own device’ technology solutions that is now making its way across the workplace. Other variants such as CYOD (Choose Your Own Device) where the company let the user pick from a predetermined list of devices, POCE (Personally Owned, Company Enabled) where a your company manages the use of your personal device, and COPE (Company Owned, Personally Enabled) where your company supplies you with a device and you can use it for personal use.

tinsleyNET IT Servces Consultants #WeCanHelp

#WeCanHelp

We can help you make the most of your mobile device. For personal users, that might mean securing the device against fraudulent activity, and for business it could mean designing and deploying a policy to manage BYOD in the workplace.

Whatever your need, we can advise and implement the security and systems you need to manage your portable devices.

Firewalls

tinsleyNET Firewall Services
tinsleyNET Network Security

Protecting your private network

You might be a home user with a handful of devices connected via wifi or you might be a multi-office organisation running an in-house hosted commerce website, either way you need to protect your network at the point it connects to the internet to prevent unauthorised access, block access to untrustworthy sites, and watch for suspicious activity.

What it does

The firewall is often the outer-most line of defence around your precious data. At the perimeter it needs to be flexible enough to let you work uninterrupted, but robust enough to protect against the barrage of probes and attacks it’s likely to face. It should be configurable and dynamic to be able to adjust to your needs and to be able to identify the latest threats.

Hardware or Software

Both have their advantages and in a corporate situation, both can be used to offer multiple lines of defence against attack.

A hardware firewall will usually by faster at processing data and so reduce any potential bottleneck. They can be configured to use real-time virus checking on incoming data, monitor outgoing data for suspicious activity and provide advanced tools like reputation management, unified threat protection and bandwidth shaping.

Software firewalls have the advantage of being cheaper and easier to mange. They are installed on the device you are protecting so are portable with that device . They can offer more refined controls per device or per app, and can be configured to alert you to unexpected behaviour.

But I don’t need one at home

tinsleyNET Network Security Services

With more and more home devices becoming ‘smart’ the number of internet connected devices you have might be more than you think. You should be managing your internet connection because ultimately, you’re responsible for the content downloaded.

In a number of recent ‘botnet’ attacks on major sites, home internet connected devices that had been compromised were used in the attacks.

A number of home security devices, specifically those with cameras or microphones in them, have been compromised and their content streamed live to the internet.

tinsleyNET IT Servces Consultants #WeCanHelp

#WeCanHelp

We can help you with with selecting, supplying, installing and managing a firewall that’s suitable for your needs. You might just need to protect your home WiFi connected devices, or you might need a corporate firewall that allows remote users to access the company network from anywhere in the world, but you do need a firewall.