The Data Security industry is changing rapidly, and as fast as new encryption technologies emerge then new methods to crack them follow on. GEN as a business prides itself in offering the most secure voice and data services available with high level mitigation technologies. Our point to point and point to multipoint layered encryption solutions ensures that your data reaches its destination securely and intact. Our secure voice services ensure that your conversation remains secure and with relatime 'secure channel' indications you know this on every call you make. When it comes to secure access to private secure systems, GEN's SAS service ensures multi-layered encryption and access control for over the internet connectivity or advanced off-net Dial-up / Satellite connectivity for those special cases that demand absolute secrecy.  

  • Cyber Security, Network Security, Protection and Counter-Espionage

    When considering how to fully protect your network the options are many and varied but the goals are the same, to keep the public internet out and your data and documents in. 

    Protect the network from outside reach

    Many companies these days are making the decision that having public inward access to resources whether that be a mail server or otherwise is simply not worth the risk especially when pretty much everything can be mirrored to an oursourced platform that is 'someone else's problem', but even when you outsource there are still risks especially when files and data are mirrored to local storage. Having very tight controls on what is mirrored and when is of the upmost importance to ensure both the integrity and security of the intranet.

    Protect the network from internal compromise

    Its a common belief that firewalls are only used to seperate the intranet from the internet at the network border, but in fact this is far from the truth and in any intranet there should be segmentation and firewalls to limit the risk of an internal compromise. A good example would be a network virus that due to the failure of your primary network security controls managed to end up on a workstation, without segmentation that network aware virus now has the entire company available to it along with the undoubtably expensive remediation. Segment your intranet and filter the data between segments to ensure that any risk is localised and identified quickly. Deploy proactive monitoring of both workstations and servers can also be very important to highlight 'unusual' behaviour and target your security staff. Use smart switching to generate alerts for unknown MAC addresses, or ports that come up or go down, unusual traffic levels and so on.  

    Protect the network from social engineering threats. 

    One of the many techniques used today to breach company networks is social engineering, the sending of an email to an employee that appears to come from that employees boss with an attachment (or if you've already covered that avenue then a link and instructions), or a delivery guy delivering something to your network that you weren't expecting, a printer service guy infecting printers with malware, the read the meters guy and the list goes on. Employees aren't stupid but they will make mistakes and are by far the largest risk in any security infrastructure. In order to cover all of the avenues of attack you need to cover all the avenues of return by ensuring that internet access is limited and filtered, as is email. USB ports should always be disabled and with heavy segmentation and endpoint monitoring your starting to make it really hard to penetrate the network. 

    Protect the network from data leakage

    The term 'data leakage' is the new way of saying data theft but it means the same. Having your data stolen is not rare, its as commonplace as spam and yet in 9 out of 10 cases the employer is completely unaware. Why? well because of multiple failures in network security strategy allows for data leakage to not only occur without challenge, but for there to be little or no evidence left behind. In fact the first most companies know about data theft is when it appears in the public domain and that's way too late. Preventing data leakage is more than just firewalls and segments, its about real risk assessment, strategies and processes. Our Managed Storage Options service which is widely used by corporates for data and document storage employs extensive logging of every file access, read, write, copy, and so on all tied back to IP & User but that's just an example and there's much more to the it than just logging, you need to be proactive in establishing the security framework and reactive in responding to potential threats quickly and effectively.  

    If your network security needs a review or some advice, or if you'd like to outsource your network security to us then contact us today for a free assessment. 

  • GEN Security Decryption & Password Recovery

    GEN offers a wide range of security decryption services and are able to currently decrypt and/or remove passwords from the following file types: 

    APPLICATION / SERVICE

    FILETYPES

    Adobe Acrobat

    PDF

    Symantec ACT! 2.0 - 2000

    BLB

    ACT! by Sage 2005 - 2009

    ADF

    Android Backup 4.4 or earlier

    AB

    Android Image 4.4 or earlier

    BIN

    Apple Disk Image

    DMG, DD

    Apple iCloud Token

     

    Apple iTunes Backup / iOS 4.x - 9.x

    PLIST

    BestCrypt 6.0 - 8.0

    JBC

    FileMaker Pro 3.0 - 14.0

    FP3 / FP5 / FP7 / FMP12

    Google Chrome Website

     

    ICQ 2000 - 2003, 99a, Lite

    DAT / FB

    KeePass

    KDB, KDBX

    Lotus 1-2-3 1.1+

    WK!, WK1, WK4, WRC, WR1, WR9, 123

    Lotus Notes 4.0 - 8.0

    ID

    Lotus Organizer 1.0 - 6.0

    ORG / OR2 / OR3 / OR4 / OR5 /OR6

    Lotus Word Pro 96 - 99

    LWP

    LUKS Disk Image

    DD, IMG, BIN, E01

    Mac OS / FileVault2

    DMG, DD, IMG, BIN, E01

    Mac OS X Keychain

     

    Mac OS X User / Hash

    PLIST

    Mac OS X 10.8 - 10.10 User / Hash

    PLIST

    Mozilla Firefox Website

     

    MS Access 2.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013

    MDB / ACCDB / MDA / MDW 

    MS Backup

    QIC

    MS Excel 4.0 / 5.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013

    XLS / XLSX / XLSM

    MS Pocket Excel

    PXL

    MS Excel VBA

    XLA, XLSM

    MS Internet Explorer Website

     

    MS Internet Explorer Webform

     

    MS Internet Explorer Content Advisor

     

    MS Mail

    MMF

    MS Money 99 or earlier / 2000 / 2001 / 2002 / 2003 / 2004 / 2005 / 2007

    MNY

    MS OneDrive

     

    MS OneNote 2003 / 2007 / 2010 / 2013

    ONE

    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Email Accounts

     

    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Form Template

    OFT

    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Personal Storage

    PST

    MS Outlook Express Accounts

     

    MS Outlook Express Identities

     

    MS PowerPoint 2002 / 2003 / 2007 / 2010 / 2013

    PPT, PPTX, PPTM

    MS Project 95 / 98 / 2000 / 2002 / 2003

    MPP

    MS SQL SERVER 2000 / 2005 / 2008

    MDF

    MS Windows NT User / Secure Boot Option

     

    MS Windows 2000 User / Secure Boot Option

     

    MS Windows 2000 Server User / Secure Boot Option

     

    MS Windows 2000 Server Active Directory Administrator

     

    MS Windows XP User / Secure Boot Option

     

    MS Windows 2003 Server User / Secure Boot Option

     

    MS Windows 2003 Server Active Directory Administrator

     

    MS Windows 2003 SBS User / Secure Boot Option

     

    MS Windows 2003 SBS Active Directory Administrator

     

    MS Windows Vista User / Secure Boot Option

     

    MS Windows Vista / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 2008 Server User / Secure Boot Option

     

    MS Windows 2008 Server Active Directory Administrator

     

    MS Windows 2008 Server / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 7 User / Secure Boot Option

     

    MS Windows 7 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 2012 Server User / Secure Boot Option

     

    MS Windows 2012 Server Active Directory Administrator

     

    MS Windows 2012 Server / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 8 - 8.1 User / Secure Boot Option

     

    MS Windows 8 - 8.1 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 10 User / Secure Boot Option

     

    MS Windows 10 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows Domain Administrator

     

    MS Windows Live ID Account

     

    MS Windows NTLM/LANMAN Hash

     

    MS Windows Phone

     

    MS Windows User / UPEK

     

    MS Word 1.0 / 2.0 / 3.0 / 4.0 / 5.0 / 6.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013

    DOC / DOT / DOCX / DOTX / DOCM

    MYOB earlier than 2004 / 2004 / 2005 / 2006 / 2007 / 2008 / 2009 / 2010

    PLS / PRM / DAT / MYO

    Network Connection

     

    Norton Backup

    SET

    OpenDocument

    ODT, ODS, ODP, ODB

    Paradox Database

    DB

    Peachtree 2002 - 2006 / 2007 / 2008 / 2010 / 2013

    DAT

    PGP Desktop 9.x - 10.x Zip

    PGP

    PGP Desktop 9.x - 10.x Private Keyring

    SKR

    PGP Desktop 9.x - 10.x Virtual Disk

    PGD

    PGP Desktop 9.x - 10.x Self-Decrypting Archive

    EXE

    PGP WDE

    DD, IMG, BIN, E01

    GnuPG Private Keyring

    GPG

    Quattro Pro 5 - 6 / 7 -8 / 9 - 12 / X3 / X4

    QPW, WB1, WB2, WB3

    QuickBooks 3.x - 4.x / 5 / 6 - 8 / 99 / 2000 - 2014

    QBW, QBA

    QuickBooks for Mac 2013 / 2014

    QB2013 / QB2014

    QuickBooks Backup

    QBB

    Quicken 95 / 6.0 / 98 / 99 / 2000 - 2014

    QDF

    RAR 2.0 Archive

    RAR

    RAR 2.9 - 4.x (AES Encryption) Archive

    RAR

    RAR 5.x Archive

    RAR

    Remote Desktop Connection

    RDP

    Safari 5.0 - 5.1 Website

     

    Schedule+ 1.0 / 7.x

    CAL / SCD

    TrueCrypt Non-System Partition/Volume 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt System Partition/Volume 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Whole Disk 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Hidden Partition 6.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Hidden OS 6.0 or later

    DD, IMG, BIN, TC, E01

    Unix OS User Hash

     

    WordPerfect 5.x / 6.0 / 6.1 / 7 - 12 / X3 / X4

    WPD

    WinZip 8.0 or earlier

    ZIP

    Yandex Browser Website

     

    Zip Archive

    ZIP

    7-Zip Archive

    7Z

     

    This is by no means an exhaustive list and there are new decryption strategies added regularly as we encounter them. If you have a file, disk, system or device that is protected by password and/or key then we can unlock it. The time and resources required depend largely on the protection mechanism and we can advise of these at point of order. 

     

  • GEN Security Auditing

    Even the most basic connectivity implementation can have holes in it, from switching/routing firmware flaws to inadvertently enabled VPN protocols or badly configured firewall rules and that's what Network Security Auditing is all about, an impartial double check of the security measures you've already implemented. During the audit we will attempt direct and indirect exploitation of your systems to reveal any possible issues with the network fabric, then we'll turn to what is by far the largest risk to security, the staff. Giving staff access to ONLY what they require to do their job has been the default position on network security since the 70's but its so often the case in smaller companies that staff have access to way more than they need, sometimes even administrative privileges! Below is a very simple overview of the audit process: 

    • Analyse network security from the public internet - check for vulnerabilities and exploits. 
    • Analyse network security from the LAN (or WAN) - check for vulnerabilities, exploits, and sample the data stream for unknown or suspicious packets. 
    • Analyse the LAN for RAT (Remote Access Tools) that have been willingly or unknowingly installed and have open connections to the internet. 
    • Run a full security scan of storage and fabrics. Ensure that corporate data is secured in such a way that would make its compromise very hard. 
    • Analyse user permissions, reach and effect. Look at password strengths, two factor authentication, and of course post-it notes with passwords on them stuck to the front of PC's. 
    • Analyse cloud based services for security and resilience. 
    • Analyse anti-virus and IDS systems for effectiveness. 
    • Analyse Wifi Networks, connectivity and compromises. 
    • Analyse laptops, tablets, and other remote solutions which may or may not have an impact on network security. 
    • Analyse Staffing risks, single point of failures, and high risk individuals. 

    And then we write a full and detailed report of our findings with recommendations at each stage. Once all the issues have been resolved we'll re-audit again to confirm. Security Auditing is priced sensibly on a day rate basis, and one day is often sufficient for small businesses with one connection. Larger organisations may take several days or more but we will be able to provide an estimation prior to commencing any work.

    If you think your business would benefit from a Security Audit then contact us today for more information! 

     

  • GEN Business Security Services (BSS) - Enterprise Class Protection

    Better than the competition

    GEN Business Security Services are based on the legendary Trend Micro Business Security portfolio which achieved the highest overall score from AV-Test.org for all participating vendors on corporate endpoint security.

    For the past three years, more businesses worldwide have trusted Trend Micro for content security than any other provider.

    GEN Business Security protects business users and assets from data loss & viruses helping prevent any disruption to your day to day business. Powered by the Trend Micro Smart Protection Network GEN Business Security:

    • Stops threats in the cloud “ before they can reach your network and devices.
    • Filters URLs blocks access to inappropriate and non business websites on a per user basis.
    • Protects PC, MAC, Servers, IOS & Android Devices, Point of sale devices & USB drives.
    • Prevents business data from being shared via USB drives and with added protection to prevent data being shared via email messages.
    • Safeguards against phishing as well as social engineering attacks through URL and Behaviour monitoring.
    • Provides you with a comprehensive managed solution monitored 24/7 by our Networks Operation Centre.

    GEN Business Security Services is cloud based hosted security system. You do not need to incur the cost of deploying and managing a server locally. 

    The security software is updated automatically. You do not need to schedule any resources or additional budget for this purpose.

    Installing GEN BSS Services could not be simpler: Request an installer via the helpdesk and then follow the steps to install on the devices you need to protect both in the office and on the go.

    Weekly/Monthly reporting is provided for license management and behaviour monitoring.

    Optional Remote Manager Console to allow self-management, or fully managed. 

    With service plans beginning at as little as £1.99 per month this is not only the most comprehensive and trusted solution but also the most affordable.

    Contact us today for a quotation!

     

  • GEN SAS - Remote Access with Enterprise Class Protection

    SAS or Secure Access Service is a comprehensive and highly secure remote access technology by Juniper Networks through which you can access your corporate systems and services from anywhere with an internet connection. This is achieved via an encrypted tunnel through which the GEN SAS gateway brokers the connection to your corporate network to provide a select group of services. An example would be; an SME with a thin client CRM system operating on a local web server. They don't want to expose that web server to the internet for obvious reasons, so they select SAS as a solution to enable teleworkers to login to their CRM from iPad, iPhone and any computer connected to the internet.

    GEN SAS via the Pulse Client provides not only high security point to point encryption with local presence, but a range of endpoint protection services as well for Laptops, desktops, tablets, and Mobile devices such as Phones. 

    GEN SAS can remotely provide secure access to files and storage, RDP and VNC sessions to protected servers and application gateways, Virtual Desktops and sessions via VDI to Citrix, VMWare, Virtual meetings and much much more. 

    GEN SAS uses high level authentication such as Secure ID, SAML 2.0, PKI plus IAM integration with LDAP/AD all seamlessly supported in the backend. 

    GEN SAS has granular access auditing including Per-user, per-resource, and per-event level configuration for security as well as capacity planning and a fully featured IDS system to ensure the safety of your corporate LAN/WAN. 

     

    So, if your looking for a high security remote access solution and don't want to spend around £16k setting up your own security gateways then Contact us today for a quote!