Author: Edward Stone

#Hashtag Legal IT: Newsletter Feb 2020

The Latest Legal IT News for Professionals by Professionals…

For more information or advice on any of the topics covered, please don’t hesitate to contact NETprotocol on the below details:

Exam Season: Days of Wi-Fi Compromise Is Over for Schools

Is WiFi Downtime causing issues to your students learning experience?

The wireless edge of the network has become ubiquitous, and so too have our expectations of a reliable and secure connection. As we have become used to the convenience of connecting wherever and however we want, we tolerate the flaws in a typical Wi-Fi connection – pauses in downloads, occasional drop-outs where we must re-connect, and lengthy waits as we try to join a public Wi-Fi network. For our personal browsing, we make a conscious compromise between convenience and reliability because apart from being frustrating at times, no real harm is done. But in a school environment, reliable wireless connectivity can’t be a compromise for school learning, especially when it comes to exam season.

Multi-Channels Don’t Support Modern Learning

Multi-channel Wi-Fi has become the predominant architecture and most of the time, it does a great job. However, there are some situations where multi-channel is not the best choice – particularly in an education environment where needs are widely diverse. There are however alternative solutions that can provide a better experience.

If your school fits in to one or all of the below categories – this may be worth looking in to: 

  1. Dynamic physical environments – Mobile devices, roaming from class to class across campus usually require more AP’s to be deployed to be able to cope – although this then introduces more radio interference and brings more cost.
  2. Reliable environments – Do you have a need for connectivity to mobile devices, laptops and IPad, where even a momentary loss of data connectivity can have a serious effect?
  3. Broad location environments – Does your school have many roaming wireless users, where students are moving from one classroom to another but depend on reliable wireless connectivity?

Hybrid Wireless, puts a ‘Blanket’ over your connectivity worries!

What’s needed in today’s fast-paced technology-led schools is a cost-effective Wi-Fi solution that combines the best features of both architectures: multi-channel’s throughput with single-channel’s easy deployment and reliable, seamless roaming connectivity.

Now, with the new Hybrid Wireless solution from Allied Telesis, a Wi-Fi network can be deployed with a mix of channel architectures and administered using the same management tool. Using the name “Channel Blanket” for the single-channel architecture, the Hybrid Wireless APs can offer both multi-channel and Channel Blanket at the same time. Operating at the fastest Wi-Fi speeds available today, they are the ideal choice for reliable Wi-Fi in the challenging environments described above.

  • In a dynamic environment, Channel Blanket APs can be deployed in greater numbers than multi-channel APs because their single radio channel does not introduce interference.
  • Channel Blanket has the advantage in an environment that requires reliable roaming too. With single-channel, all APs in the network appear as if they are a single AP, so the mobile client only sees that it is connected to one large AP.
  • In an environment with a high client density, Channel Blanket can increase the available bandwidth by enabling more APs to be installed in the same area without introducing co-channel interference.

Why Allied Telesis Is the Solution for You

Allied Telesis has given schools the flexibility to configure their wireless LAN to provide multi-channel coverage for some clients and Channel Blanket for others – this is useful when some clients want the best bandwidth, and others need seamless roaming for non-stop connectivity. This Hybrid Wireless solution is an effective alternative to the compromises and work-around of multi-channel Wi-Fi.

To find out more about Hybrid Wireless and how you can have a no-compromise Wi-Fi experience with reduced administration effort at a reasonable cost, contact us or watch this video to see how it works >>

12th February 2020 | Categories: Uncategorised

NETprotocol Celebrates 20 Years of Technical Excellence

The year 2020 marks the 20th anniversary of NETprotocol. The company was started when co-founders Mike Batters and Paul Walker decided to join together to create a business that focused on delivering bespoke IT consultancy to the legal sector. With both directors having collectively gained over 50 years of experience in Legal IT, we take a look back at how this all began.

From Humble Beginnings

Technical Director, Mike and Managing Director, Paul built NETprotocol, a specialised Legal IT consultancy,  from the ground up.  A self-funded start-up, the business today remains 100% financially independent, despite having achieved 20% year-on-year growth consistently for the last 5 years.

It’s not been all plain sailing – having to work hard to acquire the technology and vendor partnerships needed to serve the stringent needs of law firms.

And it goes without saying, as a newly formed technology re-seller into the legal sector, one of the greatest challenges they faced was; reputation. Reputation has proven to be crucial to their success – a symbol of the trust a client can place in their business; and of the unsurpassed knowledge they today offer primarily to legal and other highly regulated industries UK-wide.

Having worked in the field of IT with legal client’s way before NETprotocol was born, it wasn’t long until Mike and Paul had established their first vendor partnerships, with HP, Microsoft and Citrix at the turn of the millennium – resulting in landing their first client shortly afterwards.

Laying the foundations

With NETprotocol making strides in the legal sector, they secured their first major client in 2000; a well-known, high-end law firm who today serves some of the UKs best-known celebrities; London based Lee & Thompson. As a rule, law firms are highly dependent on resilient, secure and efficient IT infrastructures and none more than Lee and Thompson given the household names this firm represents. Since joining forces almost exactly 20 years ago, when NETprotocol were commissioned to relocate their IT systems to new office premises, it is with pride they tell us that still to this day, they have a very professional and long-lasting relationship with this client.

“For the first time in my career, I can now say with confidence that we can both access and restore any data that has passed through our IT systems, almost instantly,” commented Rob Hilton, Head of IT at Lee and Thompson following the installation of a new onsite backup and offsite disaster recovery deployment. “This is truly ground-breaking in terms of Business Continuity and Disaster Recovery and would not have been possible without NETprotocol, whose expertise and technical knowledge of the legal sector is unmatched, and today support 90% of Lee and Thompson’s IT infrastructure.”

It is without doubt that by acquiring such a well-regarded client in their first year of operating, NETprotocol had put in place firm foundations for building the business they have become today, having later seen a healthy profit in that very first year.

On The Move

The next key milestone came in 2005 – marking the opening of their first office with the addition of two new members of staff and the need to officially set up a payroll.

With this move came new gains, resulting in a further office being opened and two high security data centres being built 4 years later, followed by the acquisition of two sought after vendor relationships in 2010: Extreme Networks and Proofpoint.

Partnering up

Looking to further differentiate and expand their proposition, in 2012 NETprotocol took the step to sister with an up and coming business communications specialist Everything Voice.  Forming a unique proposition which seamlessly integrated IT infrastructure with modern and efficient communications platforms, NETprotocol had identified this as a core requirement of their client base and an opportunity to further differentiate what they could offer.

This partnership has allowed both companies to grow, share information and form stronger relationships, by offering bespoke solutions with clients in both the legal, education and SMB markets, due to their shared and strengthened capabilities.

Hitting £1 million

With the growth that NETprotocol had witnessed, Mike and Paul felt it was time to bring in a dedicated and experienced Sales Director, to ensure previous performance was sustained and a clear focus for future growth was cemented. In 2012, Matt Widdowson joined the firm to take on this role and shortly afterwards secured further expansion with the signing of another key client; leading Yorkshire-based law firm, Lupton and Fawcett. In 2014, NETprotocol had more to celebrate, hitting their first £1 million of turnover.


Having ascertained their niche in the legal sector, new opportunities had emerged with clear synergies arising between the expertise NETprotocol had established and other market sectors and products they had begun to work with. Having built a presence in the education sector and started to supply cabling solutions to current clients, the decision was made to set up two dedicated divisions, to support these areas for growth.

Despite having to work with far more restricted budgets, the Education sector has very similar IT requirements to those of law firms, where security, storage and resilience are of critical importance. Likewise, cabling is an integral element of the infrastructure services NETprotocol already offer.

20 years in the year 2020

A relatively unplanned milestone, but one that in hindsight feels worth a celebration. Worth some degree of recognition at least – as the NETprotocol brand continues to go from strength to strength; a testament to its leadership; its knowledge base; and its now 20-year unprecedented reputation. Still a self-funded business which today consists of two regional offices, a UK-wide client base, over 20 employees, more than 15 vendor partnerships, two tier 3+ high security data centres, and undisputed year on year growth.

So what does the future hold?

The secret to success

This is by no means the end of their story. In fact, it appears it is just the beginning. When speaking with the Directors, we asked them what the future looks like and what they believe the key ingredients have been for their success to date?

“Strong business relationships that are mutually beneficial with both suppliers and customers, has to come top of the list,” Paul Walker, Managing Director at NETprotocol begins.

“This remains our key focus in every decision we make. How we can add value to the people we work with and depend upon is something we ask ourselves on a daily basis.”

A business that has operated with absolute precision since the day it began, their second piece of advice was typical of their ethos, “taking your time is so much more effective than rushing and doing a half-hearted job,” Mike Batters, NETprotocol’s Technical Director explained.

“Attracting the best technology partnerships was critical to our business if we were to offer a bespoke proposition which met the very specific needs of law firms, large and small. Equally, serving the clients we are working with well, rather than looking to attract more clients too quickly, has allowed us to grow organically and consolidate what we offer, building a proposition that is completely unique,” he continued.

Both Mike and Paul agreed a good support network of family and friends cannot be underestimated, whilst preparing yourself personally to take courage and adapt a strong sense of belief will also serve you well, as you are faced with the everyday challenges a new business can bring. “And failing that… coffee and lots of it, never lets you down!” Paul concludes.

As with all start-ups, this story began with a shared dream to create an IT consultancy business which was different to any other. It is impossible to know what direction your journey will take when embarking on such ambition, but as we reach the 20th anniversary of the day this dream began, we can probably safely say that it has been achieved, albeit there’s still a lot more to come.

Mike and Paul believe passionately that this would not have been possible without the loyalty and support they have seen over the course of the last 20 years from their staff, their vendors and their clients. “Thank you to each and every one of you, and we look forward to embarking on the next 20 with your continued support,” they finish.

12th February 2020 | Categories: Case Studies, Disaster Recovery, Email, Uncategorised

New Decade, New Cyber Threats

We have now entered 2020, so we are going to be looking back on at the different trends on the cyber security front in 2019 and how we can prepare to face new threats and risks that the new year may bring.

Ransomware: The ‘Gift’ to Criminals That Keeps On Giving

The main threat in 2019 continued to be ransomware, a relatively simple attack which encrypts information on endpoints and servers and demands a ransom payment in exchange for releasing the hijacked data. A ransomware attack does not attempt to be stealthy; notification of its existence is part of the MO, and aside from locking files, ransomware does not necessarily ( or directly) cause other damage to the infected system. That said, it’s precisely the knock-on denial of service effects arising from crucial data being made unavailable that make the business case to pay, or to not pay, turn in the criminals favour.

From a technical point of view, this is a threat that should be quite simple to deal with and reducing the number of organizations that continue to offer criminals an easy pay day while putting their own essential services at risk is something that should be top of the agenda for every CISO in 2020. If there is a proper backup strategy in place, all the organization has to do is erase affected workstations and recover from the most recent pre-infection snapshot or image. Even better, a trusted EDR solution is easily capable of preventing ransomware in the first place and rolling back infected devices in the second.

In practice, however, too many organizations are caught unprepared. Too many businesses have sprawling networks with poor visibility and a wide-range of legacy devices. Too many businesses are using outdated information systems; too many have insufficient awareness of the threat; too many do not backup regularly or update software frequently enough. The practicalities for some organizations are far from trivial and not to be underestimated, but the reality is that no matter how big the challenge, businesses that fail to get their networks in order and implement simple, best practices across their endpoints can expect to be severely affected by ransomware attacks.

Ransomware attacks have more than doubled globally over the past 12 months, with the United States being the target of more than half of the world’s incidents. The situation has become so dire that ransomware is considered a threat to US national security and there are real fears that ransomware attacks could interfere with the upcoming U.S. elections, either through voting machines or voter data being targeted for encryption.

Ransomware Take Away for 2020: take yourself out of the firing line, get proper protection and implement a robust backup and contingency plan. 2019 teaches us that those who fail to make the right, crucial call to get on top of their networks will be caught out.

APTs: Making Nation-State Attacks Great Again

Government-backed, advanced persistent threat actors have been particularly busy this year. Various nationalities, reportedly Chinese, Iranians and North Koreans have all been seen engaging in hacking activities during 2019, while the US government has itself made unofficial admissions of cyber attacks against Iranian facilities this year.

Notable attacks seen during 2019 were a widespread attack on the airplane maker Airbus, an attack on a host of financial entities that generated $3 billion in revenue for North Korea, and Iranian attacks on Saudi entities and companies. In addition, it turns out that the Chinese passenger plane C919 unveiled this year is almost entirely copied from a series of American and other manufacturers, suggesting that stolen IP played a big role in its development. The US Secretary of Defence recently said that China is committing the biggest IP theft in human history. Needless to say, most of the information was stolen through sophisticated cyber attacks.

Unlike previous nation-state cyber attacks, these attacks are wide-ranging, affecting a variety of bodies, individuals and companies In the process, many more entities that traditionally are not considered the targets of these sophisticated attackers are being hit. These include infrastructure companies and service providers. Undoubtedly, the changing threat landscape will also require these entities to invest more in securing their information and infrastructure.

APT Take Away for 2020: expect more of the same. As nations vie for strategic advantage in cyberspace, it looks increasingly like the battle will extend to securing and homogenising the supply chain by the big players, with the smaller players likely having to pick their side.

IoT: Yet Even More ‘Stranger Things’ on Your Network

As the number of Internet of Things (IoT) devices invading enterprise networks continues its inexorable growth, both nation-state actors and criminal enterprises have this year naturally taken an interest in exploiting IoT devices.

Earlier this year, APT actor Fancy Bear, aka Strontium, attacked printers, video decoders and IP/VOIP phones to gain wider access to corporate networks. Meanwhile, copy-cat Mirai botnets continued to exploit unpatched devices susceptible to Eternalblue throughout 2019, with one security vendor reporting that virtually all attacks seen on their honeypots were automated scripts designed to attack at scale.

Increasing attention to the security of internet-connected appliances is, therefore, a necessity for every organization. It’s becoming ever-more difficult to avoid such things appearing on your network as manufacturers continue to add internet and ‘cloud’ capability to the most mundane of devices.

IoT Take Away for 2020: network visibility is going to be crucial. You cannot defend what you cannot see, and every blindspot is a potential soft access point into your wider network.

Breaches and Leaks: All Your Data Belongs to Us!

Many of the “cyberattacks” we hear about are not attacks at all, but data breaches that are a result of malicious or negligent actions that expose sensitive information to the wider world. Digital data leakage has always existed, but as the amounts of data are growing exponentially and organizations are moving to cloud-based systems, data breaches are becoming more frequent and more severe.

Data breaches on frightening scales – like an entire nation – are the price of organizations becoming dependent on the cloud for storing information while at the same time lacking the knowledge, skill or will to implement secure cloud best practices.

For example, many organizations store their entire customer database on cloud services such as Amazon AWS or Microsoft Azure. These are robust platforms when used properly, but it’s also easy for clients to misconfigure firewalls, leave open permissions, use weak or recycled passwords or fail to secure other credentials.

Such basic failures have led to millions of sensitive records being exposed this year: medical records, financial information, personal information and more. As is so often the case, the technology is not at fault here. The challenge today is to develop the skills of the DevOps who operate these cloud environments to be aware of the dangers and to act intelligently.

Breaches Take Away for 2020: do the right thing. There’s no shortage of best practices information on how to prevent and deal with data breaches, but research has shown that even some of the top consulting firms fail to take their own advice. Don’t be one of them.

Disinformation: Fake It Till You Make It – Politics’ New Normal

This year, we experienced a rise in a trend that affects our lives more deeply than just “cyber-hacking” – the increasing involvement of cyber attacks in politics. From Israel’s Prime Ministerial candidate’s mobile phone that was allegedly hacked by Iranians, through to Israeli offensive cyber companies whose products serve various regimes around the world for spying on political parties, to campaigns with political motivations by countries such as Russia and North Korea, and even ransomware campaigns featuring images of President Trump (or Hillary Clinton).

There is an understanding in the industry, that there will no longer be any “cyber-less” elections. The UK election in December 2019 has already witnessed several cyber incidents: DDoS attacks on one of the major parties, disinformation strategies by the other, and Russian-backed entities allegedly leaking information related to key election issues have all been seen.

With Deep Fakes and disinformation campaigns now being treated as genuine electoral tactics, there is even greater need to increase general awareness among the public about this threat to democracy as the US 2020 election season arrives.

Disinformation Take Away for 2020: security mechanisms around influential political figures and political party apparatus must be tightened and more effort is needed to secure voting processes from tampering. On top of that, we all need to treat the 24/7 news cycle, designed to maximise instant likes, retweets and to hit that “gone viral” sweet spot, with a healthy degree of scepticism.

Disinformation Take Away for 2020: security mechanisms around influential political figures and political party apparatus must be tightened and more effort is needed to secure voting processes from tampering. On top of that, we all need to treat the 24/7 news cycle, designed to maximise instant likes, retweets and to hit that “gone viral” sweetspot, with a healthy degree of skepticism.


2019 was a clear continuation of the years that preceded it, but more intense — more attacks, more data breaches and greater damage throughout the world. Will 2020 bring any relief or will the threats keep escalating? The problems we’ve seen in 2019 aren’t going to “magic” themselves away, but nor are we helpless. The big takeaway from 2019 is that organizations and companies, governments and individuals must invest more in information security, education and prevention. Cybercrime is a solvable problem that no one needs to be a victim of.

But for those that continue to ignore the reality and refuse to accept the challenges of doing business in the modern, connected world, then 2020 will likely be bleaker than its predecessor, and not the other way around.

If you would like to see how SentinelOne can help your business meet those challenges and stay safe in 2020, contact us for more info or request a free demo

15th January 2020 | Categories: Uncategorised

How Safe Are You From Cyber Attacks As We Enter 2020?

Those of us who are 30+ years old will surely remember the IT panic surrounding the year 2000, known as 2YK and the millennium bug. It refered to a class of computer bugs related to the formatting and storage of calendar data for dates beginning in the year 2000. Serious problems were anticipated because many programs represented four-digit years with only the last two digits, making the year 2000 indistinguishable from 1900.

The assumption of a 20th century date in such programs could cause various errors, such as the incorrect display of dates and the inaccurate ordering of automated dated records or real-time events. All sorts of doomsday scenarios were heard all over the globe from nuclear meltdown (due to the computer system’s failure) and planes falling from the skies to communication breakdown and global shutdown.

Fortunately, none of these disaster scenarios materialized. The Y2K bug is now remembered as a moment of hysteria, a funny anecdote in time, much like the incidents that occurred 1000 years before it, when many were certain that the new Millennium would spell doom to them all (spoiler: that also didn’t happen!).

But the importance of The Millennium Bug was that for the first time in history, decision makers and ordinary citizens alike were considering cyber as a serious threat to our way of life. Fast forward 20 years and the internet is everywhere; we all use smartphones and order stuff online that is delivered to us overnight (and very soon by drones and electric vehicles). But with everything that has changed since the dawn of the millennium, are we more or less vulnerable than we have been before? Let’s examine some factors.

 Connectivity: Power With a Fatal Weakness

The most notable difference between now and then is just how connected the world has become. In this sense, we are much more vulnerable today than we were before. We cannot imagine our lives without constant connectivity and all its benefits: online shopping, social media and on demand entertainment.

Important to note- Connectivity is the backbone that enables the modern economy and global commerce, but since we’ve become 100% reliant on it, if something were to happen that prevented our using it, the results would be grave.

Open Source: Free Software, Free Vulnerabilities

20 years ago many companies were still selling perpetual software licenses, and it was impossible to imagine that free, open source software, developed by a community of hobbyists, would help many organizations run their businesses. But, now open source software is an important component of almost every technology stack.

However convenient and cheap, it embodies many risks. For instance, a recent study found that the most copied StackOverflow Java code snippet of all time contains a bug. A Java developer from Big data software company Palantir submitted this code back in 2010, and since then this code has been copied and embedded in more than 6,000 GitHub Java projects, more than any other StackOverflow Java snippet.

Important to note- Utilizing someone else’s software has never been easier, but in doing so, we’re exposing our products to dependencies that may contain flaws and vulnerabilities as well as risking the possibility of a hard-to-detect supply-chain attack.

Mobiles: Universal Trackers, Universal Attackers

We had mobile phones back then. I mean in as much as they were phones, and they were mobile: and, well, that’s about all you could do with a phone in the year 2000. Fast forward to today again and it is hard to imagine how we could pass a single day without our smartphones, being glued to the 6” screen or broadcasting every aspect of our lives to the rest of the world.

Unfortunately, this reliance on mobile technology makes us all more vulnerable. Cyber criminals know this and utilize this in myriad ways for fraud, theft and other exploits. In addition, since the mobile phone has become everyone’s “mobile command center” it has become the target of choice for reconnaissance and espionage efforts, which target users with crafted spearphishing and smishing attacks and tailored exploits for Android and iOS.

Important to note- With mobile devices increasingly used on corporate networks, loaded with apps that are rarely evaluated for vulnerabilities, backdoors or data scraping and with a history of having been connected to a variety of external, possibly insecure networks, they present a rising threat to both personal and enterprise security.

The Cloud of Uncertainty: Who Has My Data?

The cloud represents an even bigger revolution than the smartphone. It was obvious to anyone back in 1999 that mobile phones would become more powerful and serve us to consume and create media. But very few people believed back then that we would all be storing our data on someone else’s Linux server, sitting quietly in some remote location completely unknown to us.

Moreover, no one would have believed that enterprises and governments would also utilize this same infrastructure to host data and run applications. And yet, thanks to Amazon and Microsoft, the traditional IT infrastructure (which required a chilled data center at every physical location) has been replaced by a virtual infrastructure hosted in a huge data center on the other side of the world.

Our dependency on cloud services is complete. We cannot operate the global commerce and knowledge economy without it, but when an outage occurs like that which happened to MS Azure back in November – resulting in outage of several Microsoft services including Office 365, Xbox App, Xbox Live, Skype, Microsoft Azure – or the AWS outage of September, it has a tremendous impact on individuals, businesses and governments.

Important to note- When mission critical services rely on data held outside our own immediate control, the notion of ‘security’ becomes an article of faith. Who is to say if those remote servers won’t lock us out unexpectedly? How are we to know who else has access to our data or whether the devices holding it have been compromised without our knowledge?

The Internet of Things: Network Entry Points, Everywhere

The cloud is also the enabler of the next revolution, that of connected ‘smart’ devices, aka ‘Machine to Machine (M2M) or ‘Internet of Things’ (IoT) devices. This connectivity bridges the divide between the physical and the online world and enables wired devices to “sense” their environment and then “talk” to other devices, or, through the cloud, with their owners.

This kind of connectivity is being brought to everything from dustbins and street lighting to autonomous vehicles and aviation. However, it also enables nefarious cyber activities on a scale we’ve never seen before, like the Mirai botnet that generated the largest DDoS attack the world had seen to that point, and other huge botnets, sometimes comprising as many as 850,000 computers, that are then used for cryptocurrency mining.

Important to note- IoT devices bring security risks and privacy risks. Increasingly, wired ‘Smart’ devices are being recruited by botnets to gain entry into networks, and many devices leak personally identifiable information.

Meet Cybercrime: The New ‘Cost of Doing Business’

As we’ve seen, the changes that have taken place over the last 20 years have given various threat actors fertile ground on which to flourish, and flourish they have. Cybercrime has become a truly global phenomenon which impacts most industries and is expected to cost the world over $6 trillion annually by 2021.

On the defenders side, cybersecurity-related spending is predicted to reach $133 billion in 2022, and the market has grown more than 30x in the last 20 years, adding to the overall financial burden on companies and governments, most of which see the money invested in cyber as a loss or “cost of doing business”, as it is generally viewed as an expense that does not yield profit or generate revenue.

However, this ‘new’ cost of doing business is a reality that no modern enterprise can afford to ignore. From script kiddies with ransomware projects effecting everyone from individuals to hospitals or universities scaling up to to organised and sophisticated attackers targeting global organisations, the only way to do business in 2020 is with cybersecurity firmly factored in to the operational budget.

Important to note- From the smallest business to the largest multinational organisation, being part of the connected world in 2020 exposes you to risks that simply didn’t exist in the year 2000.

Final Thoughts…

December 1999 feels like a long time ago. Indeed, it really is closer in nature to the remnant of the previous century and even millennia than to our time today. It is highly unlikely that a single point of failure (like the Millennium Bug) could lead to the “end of the world”. But on the other hand, our hyper-connected environment makes us more vulnerable on so many levels, in our offices, cars and homes. Luckily, the technology hasn’t stood still and modern security mechanisms now exist that are capable of dealing with these threats across platforms, including IoT, using the latest in our tech arsenal, leveraging AI and machine learning. The Y2K bug hasn’t taken us back to the analogue world, and if we continue to safeguard our connected way of living, neither will the hackers.

For other related information, please click below:

Or if you would like to see how SentinelOne can help your business stay safe in 2020, contact us for more info or to see a free demo or our technology: 

10th January 2020 | Categories: Endpoint Security, Legal IT, Security

Top 10 Features of DLP solution from ARgon

Clearswift is a leading innovator in technology and ARgon is their highly commended DLP (data loss prevention) solution. ARgon ensures that emails leaving and entering your business are secure against malware, preventing vital information from leaking out and posing security risks. When reviewing your existing technology, you may want to check your solution offers against these top 10 features which are available from Clearswift’s ARgon:

1. Words and phrases

ARgon recognises and identifies key phrases within emails, newsletters and documents to highlight whether or not they have come from a reliable source or from a spoofing or phishing device. Without ARgon, this would have to be done by an IT department, which takes time, costs money and creates a breakdown in communication. Clearswift ARgon simplifies every stage of the process.

2. Consistency 

Clearswift is fully committed to updating its products around its core technology. Meaning that they are highly adaptive in responding to any risk of your information being extracted unlawfully and to removing hidden security threats.

3. Context and content

Unlike other DLP solutions, Clearswift ARgon recognises the context, as well as the content, of an email. For example the content of a CEO’s email will contain more sensitive information than someone from the admin team. ARgon will recognise what information should be going where, preventing unnecessary disruption.

4. Inbound & Outbound

Clearswift ARgon not only deals with emails leaving the organisation, it also examines emails entering the business. It upholds the same level of checks on both inbound and outbound emails, despite other DLPs not taking this approach.

5. Security Architecture

Transparency between the sender and the recipient is key when it comes to how ARgon works. Your main concern with your DLP solution may be that it will block key information and you will no longer be able to view what you need to. ARgon examines the email to decide whether or not the data needs to be encrypted. If this is the case, the sender will set a password which will provide access to the recipient, protecting any risk of outside threats gaining access, whilst retaining transparency.

6. Adaptive Redaction

In creating ARgon, Clearswift’s primary aim was to develop an adaptive redaction solution which fills the gaps that other DLP’s are facing. One of the main issues Clearswift identified was false positives, which cause information to be pulled out of an email despite it not being a threat. ARgon uses 3 key features to avoid this happening which include: Data Redaction; Document Sanitisation; and Structural Sanitisation. Watch how it works here >>

7. Cost

Due to Clearswift’s comprehensive integration with Microsoft Active Directory service, they have been able to drastically reduce the cost of their products, making ARgon not just the most effective, but also the most affordable solution on the market.

8. Track and Trace Technology

These days computer viruses are so well hidden – often in places where you least expect to find them – the hackers will purposefully target vulnerable content, for example information that you’re most likely to copy and paste. Clearswift uses a IGS (Information Governance Server) which tracks content and ensures if there is hidden malware, this is removed.

9. Flexible Deployment

Clearswift ARgon can be used on premise or from a hosted environment, to ensure that employees can work flexibly and still benefit from advanced data loss protection, whatever their location.

10. 24/7 Support Service

NETprotocol and Clearswift work together to provide a dedicated support service operating 24/7 throughout the year – ensuring that your business retains optimum protection and security at all times.

To watch how this technology works please click below, or contact one of the team to arrange a demo: 

12th November 2019 | Categories: Email, Security

Big Bank Falls Victim To Firewall Vulnerabilities

Last week banking corporation Capital One suffered a huge blow after having a data breach which has affected over 100 million customers worldwide. Capital One is expected to lose between $575 million in fines and up to $700 million in lawsuits and compensation.

How Did This Happen?

The data breach was down to a vulnerability in the firewall which the hacker took advantage of to enter customer accounts. This was due to the firewall and web application not being properly updated and configured to protect its information against intelligent malware.

How Can I Protect My Companies-Information From Hackers?

The most important thing to take away from the Capital One data breach is that most data protection companies do not offer a complete all-rounded security solution platform. With the added risk of human error that can inadvertently allow data thieves access to private information within your business, there are ways to ensure your business is secure. NETprotocol recommends using a next-generation endpoint security solution such as SentinelOne. This technology is built to protect against known and unknown attacks by identifying and mitigating malicious behaviour at the machine speed level. The endpoint solution is fully guaranteed – in-fact, they are so sure it won’t let you down, it comes with an insurance policy that offers compensation to cover the effects of any dangerous ransomware attack which it failed to recognise.

To read the full article and understand why Capital One were breached, click below: 

Or to contact us and check that your network is currently secure from similar attacks:

5th August 2019 | Categories: Endpoint Security, Firewalls, Legal IT, Managed Services, Security