19 December 2013

Increasingly, VoIP solutions are under attack.  We see IP PBX’s being targeted by toll fraud, DDoS or being hacked as companies keen to benefit from the undoubted advantages …

19 December 2013

Frequently there is a lot that can be done with existing equipment to improve an organisation’s security posture.  This not only improves general security, it can help an …

19 December 2013

Use Cases, used well Security Information and Event Management (SIEM) can be a massively useful tool in helping organisations discover Spam bots on their networks, identify malpractice by …

19 December 2013

Advanced Persistent Threats (APT) are much talked about and used in a lot of marketing but what exactly are they?  Many commentators indicate that they are more persistent …

19 December 2013

Virtual Local Area Networks (VLANs) present a number of advantages.  They can add to a layered defence and improve the flexibility of network design.  However, if they are …

19 December 2013

Voice over IP (VoIP)  systems are increasingly popular.  However, IP-based private branch exchanges (PBXs) are being hacked or targeted by toll fraud and distributed denial of service (DDoS) …

19 December 2013

When people talk about Virtual LANs (VLANs), they tend not to focus on the security features of this versatile network topology.  However, there are several tangible security vulnerabilities …