SIDEBAR
»
S
I
D
E
B
A
R
«
Is Your’ Internet Connection or Wireless Network Letting You Down?
Jan 12th, 2015 by aperio

My business relies on the Internet; my phone is an IP phone, it uses the Internet. If the Internet goes down so does most of my business until it comes back up in maybe hours or days. It doesn’t stop there though because even my TV uses the Internet these days and then there’s all those cloud services which means some of my data may not be on any of my computers. I’m running a cable Internet connection and it’s pretty fast especially when it comes to downloads. The faster the broadband the more we can do with it and the more we rely on it. And… it doesn’t even stop there either! Laptops, mobile phones, tablets, TV’s, set top boxes, NAS drives, stereo systems, cameras etc. use wireless so wireless is really important too.

If you are running an Internet dependent business or would really miss your Internet connection at home you won’t want it to go down ever! Well, maybe when you are on holiday… uh oh, got a remote security camera linked to your phone through the Internet or some other device, maybe a remote Internet linked pet feeder or something.

I think most of us want reliable all the 9’s uptime for our Internet but of course that’s not always easy to achieve. Making it 100% reliable I cannot promise in fact even all the 9’s is not that easy but I can probably show you how to make your Internet faster, have a higher capacity, make it more reliable and improve your wireless whilst keeping costs reasonable!

A Common Problem

Most homes and small businesses have 1 Internet connection, 1 line and 1 router that functions as a router a switch and a wireless access point… true? If any of those elements go down then so might your Internet access. You could go ask the neighbour if you could sling a wire through to your business from their supply or ask for their wireless password and maybe sometimes this is OK, it’s a temporary solution of a sort. If you want to be self-reliant though you’ll probably need a better solution.

What happens if…

Your router fails

Simple, go get another router, configure it up (hope you know where your broadband login details are) or better still, have another router on standby, just in case! From my experience most people or businesses don’t have a spare. Your current router might be a bit special but anything will do to get you back up and running if a direct replacement is not to hand.

Your Internet connection fails

It could be your ISP, a fault on the line or a JCB digging outside. Either way it’s down to the service level agreements of your provider. You’ll probably be down for a few hours, maybe a few days and if you are really unlucky, a few weeks, it happens, especially if the road needs digging up.

Flaky Wireless

Wireless has come a long way but it’s still a flaky service. It depends on lots of things, how many people are already connected, what’s in your building, atmospheric conditions, the type of wireless network you have and the capabilities of the devices you are trying to connect to it etc.

It’s also not so great when you have more than 1 wireless access point but your device stays connected to the access point you were near 2 minutes ago and which is now nearly out of range. You could be standing next to another access point on the same network but still not connect to it unless you manually do so.

Does all or some of this sound familiar?

A Solution

There are very fast Internet connections with high up-times and excellent service level agreements that mean if your Internet connection does go down it gets fixed quickly but of course that can cost a lot of money and a JCB going through the cable is probably going to scupper even that plan for a while. There’s WiMax, line of site links and even satellite connections but, well, it’s a bit expensive and maybe a bit over the top for many.

My suggested solution below is not new but it has improved over time and costs less than it used to. Not all brands and/or models will let you do this but the right devices are readily available and affordable.

More than 1

Broadband is pretty cheap so how about 2 supplies over different networks so that if it’s the ISP or just 1line that fails then the other is likely to continue to work. Just to make it belt and braces how about feeding in a mobile broadband supply just in case that clumsy JCB comes your way and cuts all the cables to your premises (don’t laugh, this happened to a company I worked for).

In this case you should have 2 broadband feeds going into the same router which will balance all your Internet traffic using the 2 services giving you more speed and capacity. If 1broadband service fails then the other carries on until the failed service comes back up. If both services fail then the mobile broadband cuts in.

The mobile broadband does depend on the mobile signal you can get where your router is located and whether it’s 3G or 4G but at least it will let you access the Internet. If it’s 4G this could be pretty good! You will need to watch your mobile broadband use depending on the tariff you are using but at least you are still up and running.

What if the router fails? Well of course this can happen so for the cost of it I would keep a second router as a backup. You can backup the configuration of the router in use and load it onto the second router. You can backup the configuration each time you change it and either load it onto the second router or at least have it ready. For some devices, there are extended warranties available where they will replace your failed device the next working day with no quibbling. You could even use the second router as a second modem if you configure it correctly but that’s a subject for another day.

Improving Wireless Connectivity

Wireless or WiFi has improved over time. The range is greater, it’s more reliable and easier to connect to than it used to be but it’s still a variable and sometimes quirky technology. If you need a consistent service over a defined area then you’ll probably need to overdo it with wireless coverage.

Many routers are not just routers; they are routers, switches, modems and wireless access points. The wireless part of your main router will provide all you need in a small space but as an operating space gets bigger you will need further wireless access points to cover the area. Wireless access points can be obtained for both indoor and outdoor environments and can work well in a campus environment.

Two Variants

There are two main variants which we can call push and pull systems. To use a couple of techy terms, the wireless system we’ll call the server and your mobile phone, laptop tablet or other wireless device the client.

Pull

Most domestic or small office wireless systems are pull systems which means you manually connect your client device to a wireless server. For example, an office or house has 2 access points, 1is a wireless router downstairs and the other is a wireless access point upstairs. When your client device is connected to the downstairs router (the server) it stays connected to it until it goes out of range so if you walk upstairs you may need to manually disconnect from the downstairs router and connect to the upstairs wireless access point. It works but it’s clunky and moving smoothly from 1wireless zone to another does not occur. Both wireless access points are part of the same system but the connection to them isn’t managed automatically. You could say that you have to pull connections.

Push

Using the same scenario now the wireless system is being managed and pushing connections. The effect is that when you walk up the stairs the wireless management software built into the system monitors it’s connections and as the signal from 1wireless access point becomes weaker and another stronger it pushes connection to the stronger wireless access point to your client device such as your phone.

Another great thing about Managed Wireless is that it will share the load so if several devices are in range of more than 1access point those access points can be made to share the wireless traffic instead of 1being overloaded and the other hardly used.

Now you can walk up and down stairs with your client device and stay connected without having to think about it. Where two or more access points are located to manage a lot of wireless traffic they can look after the traffic loads so the user gets a good solid wireless service throughout the operating area.

Sounds Expensive

Managed Wireless used to be expensive but it’s not now. It does cost more than pull wireless but not much more and is well within credible cost for domestic or small business users. If you need it it’s well worth the modest extra cost.

You will need routers and wireless access points that can all function as part of a Managed Wireless system and you will need 2 x broadband supplies which can be a mixture of ADSL max, ADSL2+, Fibre known as FTTC or some other suitable broadband/Ethernet supply. You can use cable broadband. 2 lines carrying BT like broadband will give you 2 lines of voice as well.

 

Article Source: http://EzineArticles.com/8851919

Photo Source: http://pixabay.com/en/users/stux-12364/

Business Lessons Learned From The Sony Hack Attack
Jan 5th, 2015 by aperio

The hack attack on Sony has been a business disaster for the movie company.

In addition to leaked emails, revelation of salary data, and unfortunate disclosure of various private opinions regarding movie stars and upcoming films, the company’s stock price fell by double digits.

Sony’s business is of course entertainment and the media has had a field day with all the secret details regarding Hollywood celebrities. The nightly newscasts have played out like a soap opera and the company’s attempts to plug the gaps have been futile at best.

It remains to be seen how all this will play out long-term both internally and externally. Certainly relationships have been stressed to the maximum with corporate executives. Movie makers and “A” list actors may be hesitant to do business with the company.

While many cyber experts, including the FBI, have been quoted as saying this attack was planned and executed at a very high level of sophistication, reports indicate the company was not in full lock-down from a potential breach.

In fact its PlayStation network suffered an attack in 2011. Personal information on millions of PlayStation games were stolen. The network was down for weeks. Many question whether these issues were ever fully addressed.

Admittedly Sony is a worldwide organization and high-level cyber attacks are more likely targeted against larger well-known companies. JP Morgan Chase and eBay were both recent targets.

Still most companies of all sizes can take appropriate steps to ensure the highest levels of security protection are in place.

These include…

1. Investing appropriately in cyber security. Many large corporations don’t allocate the resources for high levels of security. They wait until disaster strikes and then make the appropriate investment in firewalls, anti-viral programs etc. The same holds true for smaller organizations. Unfortunately smaller companies may not have the luxury of an easy of a bounce-back as a multi-national giant. Small firms could lose sales, contacts and key data. A small business could be down for days or even weeks. Such a breach for a smaller organization could make the difference between ensuring a year of profitability or falling into the “red”.

2. Preparing for a well-planned response. All businesses should have a back-up system in place. Electronic off site back-up utilizing the cloud, for example, is a solid way to retain all records and data should records be breached, stolen and/or lost. Proper back-up enables a company to maintain business operations with little downtime as possible.

3. Creating a crisis communications plan. Chances are your firm will not be the subject of intense media scrutiny should a breach occur and important, private data made public. Still in this litigious environment it makes sense to have a plan in place should a crisis occur. This should involve a technology component to discover how the breach occurred and to take the proper IT related steps to prevent it from happening in the future. It should also involve a media component to properly address inquiries from print and television reporters. The document should be reviewed and updated periodically. Hopefully this plan will not need to be enacted but is money well spent should disaster occur.

The hack attack on Sony is a good reminder that an attempted breach can occur to almost any company at any time. Executives should not be hesitant to invest in the highest levels of Internet security no matter the size of the business.

 

Article Source: George Rosenthal
Photo Source: Christopher Skorr
The Importance of IT Security Analytics
Jan 2nd, 2015 by aperio

The scope of IT security analytics is broad. Threat intelligence if provided in advance will help to prevent any security incidents from occurring. Though complete mitigation of the risks is an impossible task and hence incidents are inevitable which are mostly associated with breach of data. Initially it was believed that IT security analytics was a requisite before, during and after the incident. In the past there were different products in each area, but the boundaries between them are blurring. Blacklists and Whitelists Threat intelligence is the lifeblood of the IT security industry. Common spam emails, malware signatures and fake URLs are included in the blacklists whereas all the applications that the users use for their legitimate purpose are included in the whitelists. IT security suppliers have access to resources at some level. However it is known that intelligence gathered before is never going to stop the unwanted security breaches from occurrence. What can be done when an event has occurred or data have been breached? In such cases the need is to understand the extent of damage.

Applying IT forensic methods like reports for internal investigation or communicating with crime investigators. Examples of such incidents include discovery of unknown malware or disgruntled employees in the company. Guidance released a new version of Encase product called Encase analytics. These analytics collects clues to what has happened on the servers, storage systems and end user devices. Encase analytics is a network based tool where huge volume of data is involved. Encase analytics needs kernel level access across multiple operating systems to inspect registries, system data, memory, hidden data, and so on. Network and security appliance log files are also of use. Guidance makes use of SIEM (security information and event management) tools. The benefits include ready customised reports for certain regulatory regimes like PCIDSS, the UK Data Protection Act and the mooted EU Data Protection Law. Access Data’s Cyber Intelligence and Response Technology (CIRT) provides host and network forensics as well as the trickier-to-address volatile memory, processing data collected from all these areas to provide a comprehensive insight into incidents.

New Capabilities: These new capabilities include improved malware analysis, more automated responses and real time alerts. This is all well beyond historical forensics, moving Access Data from after, to, during, and even some before capability. Access Data relies on SIEM suppliers for some of its intelligence., In the past, SIEM has also typically been an after technology. Most SIEM suppliers come from a log management background, which is the collection and storage of data from network and security system log files for later analysis. To use intelligence from a range of sources in real time in order to identify and mitigate threats as they occur is the crux of IT security. Plenty of measures like running suspicious files in sandboxes, allowing only known good files to run, blocking access to dangerous areas of the web or judicious checking of content in use can be taken. These are all products that help towards broader aspiration of real-time mitigation. Supplementing these with analytics across a wide range of sources during an attack provides more extensive protection.

Some of the examples include:

• Identifying unusual traffic between servers, which can be a characteristic of undetected malware searching data stores

• Matching data egress from a device with access records from a suspicious IP address, user or location

• Preventing non-compliant movement of data that can be done by an ignorant employee

• Linking IT security events with physical security systems

• Detecting unusual access routes The good news is more and more are making use of their ability to process and analyze large volumes of data in real time to better protect IT systems.

But the bad news is that there is no silver bullet and never will be. A range of security technologies will be required to provide state-of-the-art defences and there will be no standing still. Those who would steal your data are moving the goalposts all the time and they will be doing that before, during and after their attacks.

 

Article Source: http://EzineArticles.com/8832698

Photo Source: http://unsplash.com/

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa