Data Transit & Encryption Experts

High Performance, Secure, Low Latency and Contention

Powered by 100% Renewable Energy

The only GREEN UK Service Provider with EnergyStar, ISO14001 and an ALL ELECTRIC FLEET

Network Security

Cutting edge and comprehensive Network & Data Security Solutions.

Supplying the very best in class hardware solutions

The Latest Generation Servers from Hewlett Packard

When speed and latency really matter

GEN has the options for you

Unified Communications

Brings your computer, tablet and phone closer together

State of the Art Green DataCentres

Using the latest technology and Power Management

Comprehensive Software and Systems Development

PHP, ASP, C++, C#, Javascript, Python, HTML, CSS and more.

High Performance and Specialist Workstations

For those who simply want more

When considering how to fully protect your network the options are many and varied but the goals are the same, to keep the public internet out and your data and documents in. 

Protect the network from outside reach

Many companies these days are making the decision that having public inward access to resources whether that be a mail server or otherwise is simply not worth the risk especially when pretty much everything can be mirrored to an oursourced platform that is 'someone else's problem', but even when you outsource there are still risks especially when files and data are mirrored to local storage. Having very tight controls on what is mirrored and when is of the upmost importance to ensure both the integrity and security of the intranet.

Protect the network from internal compromise

Its a common belief that firewalls are only used to seperate the intranet from the internet at the network border, but in fact this is far from the truth and in any intranet there should be segmentation and firewalls to limit the risk of an internal compromise. A good example would be a network virus that due to the failure of your primary network security controls managed to end up on a workstation, without segmentation that network aware virus now has the entire company available to it along with the undoubtably expensive remediation. Segment your intranet and filter the data between segments to ensure that any risk is localised and identified quickly. Deploy proactive monitoring of both workstations and servers can also be very important to highlight 'unusual' behaviour and target your security staff. Use smart switching to generate alerts for unknown MAC addresses, or ports that come up or go down, unusual traffic levels and so on.  

Protect the network from social engineering threats. 

One of the many techniques used today to breach company networks is social engineering, the sending of an email to an employee that appears to come from that employees boss with an attachment (or if you've already covered that avenue then a link and instructions), or a delivery guy delivering something to your network that you weren't expecting, a printer service guy infecting printers with malware, the read the meters guy and the list goes on. Employees aren't stupid but they will make mistakes and are by far the largest risk in any security infrastructure. In order to cover all of the avenues of attack you need to cover all the avenues of return by ensuring that internet access is limited and filtered, as is email. USB ports should always be disabled and with heavy segmentation and endpoint monitoring your starting to make it really hard to penetrate the network. 

Protect the network from data leakage

The term 'data leakage' is the new way of saying data theft but it means the same. Having your data stolen is not rare, its as commonplace as spam and yet in 9 out of 10 cases the employer is completely unaware. Why? well because of multiple failures in network security strategy allows for data leakage to not only occur without challenge, but for there to be little or no evidence left behind. In fact the first most companies know about data theft is when it appears in the public domain and that's way too late. Preventing data leakage is more than just firewalls and segments, its about real risk assessment, strategies and processes. Our Managed Storage Options service which is widely used by corporates for data and document storage employs extensive logging of every file access, read, write, copy, and so on all tied back to IP & User but that's just an example and there's much more to the it than just logging, you need to be proactive in establishing the security framework and reactive in responding to potential threats quickly and effectively.  

If your network security needs a review or some advice, or if you'd like to outsource your network security to us then contact us today for a free assessment. 

Cyber Exchange Member Badge FullGEN has been accepted as a member of the UK's Government Backed Cyber Exchange

The Cyber Exchange is a fantastic place to find Security Companies, Resources and News relating to Cyber Security within the UK. GEN has for many years been providing highly responsive cyber, network and email security solutions and services. Our Antispam and Antivirus gateways protect your organisation from email based threats and our Internet Gateways likewise protect your organisation from internet based threats. We offer some of the highest security encrypted connections as well as encrypted telephony and premises security. 

 

Our 2022/2023 Referral Program

The majority of our new business comes from customer referrals, and that's awesome, but we wanted to reward those customers who refer us somehow. Traditionally, we did this by crediting their account with £25

...

privateWith so many companies offering public cloud services such as Microsoft Onedrive, Google Drive, Apple iCloud, Dropbox, etc, it is a tempting choice for hosting your sensitive data, but there are alternatives that are not only significantly

...

In recent months, Delaware-based U.S. District Court Judge Colm Connolly started an inquiry into some patent trolling companies that have filed dozens of lawsuits in his court. Last month, lawyers for

GEN has been an investor in Synology hardware and solutions since its arrival on the market, and in that time Synology has become synonymous with quality and performance in the dedicated NAS arena. Founded in 2000, Synology is dedicated to

...