Cyber Security, Network Security, Protection and Counter-Espionage

When considering how to fully protect your network the options are many and varied but the goals are the same, to keep the public internet out and your data and documents in. 

Protect the network from outside reach

Many companies these days are making the decision that having public inward access to resources whether that be a mail server or otherwise is simply not worth the risk especially when pretty much everything can be mirrored to an oursourced platform that is 'someone else's problem', but even when you outsource there are still risks especially when files and data are mirrored to local storage. Having very tight controls on what is mirrored and when is of the upmost importance to ensure both the integrity and security of the intranet.

Protect the network from internal compromise

Its a common belief that firewalls are only used to seperate the intranet from the internet at the network border, but in fact this is far from the truth and in any intranet there should be segmentation and firewalls to limit the risk of an internal compromise. A good example would be a network virus that due to the failure of your primary network security controls managed to end up on a workstation, without segmentation that network aware virus now has the entire company available to it along with the undoubtably expensive remediation. Segment your intranet and filter the data between segments to ensure that any risk is localised and identified quickly. Deploy proactive monitoring of both workstations and servers can also be very important to highlight 'unusual' behaviour and target your security staff. Use smart switching to generate alerts for unknown MAC addresses, or ports that come up or go down, unusual traffic levels and so on.  

Protect the network from social engineering threats. 

One of the many techniques used today to breach company networks is social engineering, the sending of an email to an employee that appears to come from that employees boss with an attachment (or if you've already covered that avenue then a link and instructions), or a delivery guy delivering something to your network that you weren't expecting, a printer service guy infecting printers with malware, the read the meters guy and the list goes on. Employees aren't stupid but they will make mistakes and are by far the largest risk in any security infrastructure. In order to cover all of the avenues of attack you need to cover all the avenues of return by ensuring that internet access is limited and filtered, as is email. USB ports should always be disabled and with heavy segmentation and endpoint monitoring your starting to make it really hard to penetrate the network. 

Protect the network from data leakage

The term 'data leakage' is the new way of saying data theft but it means the same. Having your data stolen is not rare, its as commonplace as spam and yet in 9 out of 10 cases the employer is completely unaware. Why? well because of multiple failures in network security strategy allows for data leakage to not only occur without challenge, but for there to be little or no evidence left behind. In fact the first most companies know about data theft is when it appears in the public domain and that's way too late. Preventing data leakage is more than just firewalls and segments, its about real risk assessment, strategies and processes. Our Managed Storage Options service which is widely used by corporates for data and document storage employs extensive logging of every file access, read, write, copy, and so on all tied back to IP & User but that's just an example and there's much more to the it than just logging, you need to be proactive in establishing the security framework and reactive in responding to potential threats quickly and effectively.  

If your network security needs a review or some advice, or if you'd like to outsource your network security to us then contact us today for a free assessment. 

Cyber Exchange Member Badge FullGEN has been accepted as a member of the UK's Government Backed Cyber Exchange

The Cyber Exchange is a fantastic place to find Security Companies, Resources and News relating to Cyber Security within the UK. GEN has for many years been providing highly responsive cyber, network and email security solutions and services. Our Antispam and Antivirus gateways protect your organisation from email based threats and our Internet Gateways likewise protect your organisation from internet based threats. We offer some of the highest security encrypted connections as well as encrypted telephony and premises security. 



Social Media is a wash with hysteria and false information that is starting to effect people in negative ways. At GEN we need to be ahead of the curve on this so we can actively manage our operations and ensure continuity. We will share t


yealink blockYealink have a wide range of IP Telephony endpoints with some impressive corporate features. Leveraging these features to maximum effect requires close integration with your IP Telephony Platform. At GEN we have been supplying Yealink for m


Washington, D.C.The Electronic Frontier Foundation (EFF) and the Center for Democracy and Technology (CDT) today filed a Freedom of Information Act (FOIA) lawsuit against the government to obtain records showing whether

Apple are probably one of the best known technology manufacturers having been in the business for more than twenty years. GEN are both Apple Partners and Apple Developers investing heavily in Apple based products and services in house and w