Network Security & Anti Spam
We see network security as falling in to three separate sections.
The first is what people think of as “Anti-Virus” although it is more commonly called Anti-Malware (well, it is in the IT trade anyway!). The inclusive Malware title (Malicious Software) covers all sorts of things that you don’t really want to have on your computer or network. Computer viruses are part of this group, along with Worms, Trojans, Spyware, Fake anti-virus programmes, and lots more.
Which software or software suite is best for you depends on your network and IT infrastructure. Our typical installation would be a Sophos Suite which would be installed on a file server and then on to the client PCs, Apple Macs, etc. The updates clean-ups are managed by the server with little, or no end-user intervention required. Sophos Pure Message anti-spam is usually installed as part of the suite too.
Second is Anti-intrusion, or “protection against Hackers” as it was known in Anglo Saxon times.
As the likes of the White House, MI5 and NASA have proved, it is practically impossible to guarantee that any system or network is 100% unhackable by 100% of potential hackers for 100% of the time. You can get pretty close though with the introduction of the right Firewalls, Routers and software protection to make it virtually impossible for virtually anybody to break in to your network from the outside. This is sometimes tricky to manage as more and more businesses and organisations require network access to be granted for people using smartphones, tablets, iPads etc (particularly with the trend towards BYOD (Bring Your Own Device)) so there isn’t a “one size fits all” solution. We will work with you to come up with the right solution for your particular situation and circumstance.
Thirdly, we help protect the network against accidental or malicious damage by employees and ex-employees. There is a wide variety of ways we can help protect against data loss and damage. An efficient and orderly backup procedure is the first and most obvious thing to organise (It is also, sadly, the most neglected aspect of IT security); we offer programmes for both on-site and off-site backup security and include this as part of our monthly support agreements. Secure maintenance of network usernames and passwords is another easy to implement procedure, plus we can either physically, or using software, disable usb ports and other external connections, CD & DVD drives, wireless connections, floppy disk drives (some are still in use) and pretty much any other way that someone might think they can steal or damage data.
We can also block access to certain websites or types of websites and, in serious situations, set up monitoring so that everything a user does on their computer is recorded and reported back.
Copyright © 2005-2013 Delta PC. All Rights Reserved