IT Network Security

IT Network Security Tests, Assessmnets and Improvements

Why we should look at network security measures seriously?

We are thrilled with the modern trend for intensive adopting of advanced technology implementations like  IP based  security, IP and web cameras, communication, mobile controlled  smart devices, IoT etc.  Almost any modern  interactive systems are designed to operate in conjunction with and existent IT network on site, or, as a rare exceptions, with an exclusively dedicated network and internet connectivity.

Most of the “Smart Devices” offered on the consumer market  and DIY enthusiast / retail stores today  are loudly advertised as “Plug and Play” installations, with extremely simplified setting procedures for access and use.  Typically, access and management of those implementations are based on a cloud service platform – user simply  installs the app, registers an account by email address verification and manufacturer’s cloud server handles the interaction between both ends (device and user)

The euphoria  about ease of operations and broadly advertised convenience benefits for this concept rarely refers to issues related to the impact to the activities passing through the IT routers, firewalls and other comunication devices at user’s network.

Risks and Threats

Plug and Play, and Peer-to-Peer  services are based on unique identification (MAC address or serial number) of devices, and often pass through ports and protocols of firewalls without warnings,  user’s permission and concent.

Simple internet research for example “P2P IP security camera network risks” can bring quite a lot of information and real life examples.

Without going into full details and technicalities about those issues, we would like to promote awareness and  attitude towards responsible measures for preventing the most likely risks like un-authorized opening of firewall ports, unusual packets generated and dispatched out to data collecting servers, opening back doors for malware, increased router traffic and other possible IT security incidents.

Value we offer

We are comitted to advise the users of smart devices and implements about associated  information security threats and take adequate measures for managing the risk. The paradox is that sometimes a poorly chosen and implemented security/ smart device can cause more harm to the user from a privacy and information security prospective than it’s worth as a protecting function.

Our service includes adequate and necessary assessment of the client’s network, managing detected threats and advising about the relevant day-to-day precaution activities in relation with the implemented systems.