Internet Explorer Security Flaw

In the news today is a very high profile security flaw in Microsoft browser, Internet Explorer. Hackers have been hijacking websites and inserting code that enables them to steal username and password information of persons browsing using IE. Microsoft made the situation public at the end of last week by which time they had calculated […]

Internet Watch Foundation

The IWF is a not for profit organisation dedicated to minimising the availability of UK internet content that is racially abusive or criminally obscene or contains images of child sexual abuse anywhere in the world. Their website is somewhere people can go to report such content found on the internet. Since the beginning of the year their hotline has dealt […]

Transposition of Directive 2006/24/EC

We do live in a marvellous world don’t we? If anyone was to ask you what the title of this post was all about you’d almost certainly give them a blank stare. This is all about what is better known as “The Data Retention Act” which was stipulated by the EC some time ago. This […]

Spammers Hammered – Hooray

One of our tech support team, Will Curtis, mentioned to me today that the amount of spam he has been receiving on his home email account dropped considerably around two weeks ago. He also came across this article which tells that the Federal Trade Commission in the USA had raided an organisation that was supposedly one of […]

Top Ten Security Risks For Business

These are the risks as seen by Timico engineers in their travels around our customer base together with a few of my own real world observations. This list is not authoritative but it should be insightful and if you are the owner or IT manager of a small or medium sized business then you could […]

Network Monitoring Network Monitoring

So good they named it twice. Actually I was trying to think of a sexy title for network monitoring but I couldn’t. Network monitoring is the unsung hero of a communications business. A network has to have monitoring in place to allow staff to keep an eye its health but it isn’t what might be called […]

Security Audits

Employees of large companies often whinge about the constraints placed upon them by their IT departments. These contraints normally centre around security best practice. Small businesses do not typically have the same disciplines. Timico recently performed a security audit at the request of one of it’s customers. The results were very revealing. Poor/outdated wireless security […]

The buzz of the Network Operations Centre

It always gives me a great buzz to sit in our NOC. It’s because when we started Timico only 4 years ago there were only four of us sat in the room of Tim Radford’s parents’ stable block (it was cheap and there was no room at the inn anyway). Now on a normal working […]

Update to the open door policy

I recently wrote about access control and the different ways that we can open doors at Timico. Well this has gone one step further and certain individuals on the approved list can now send an Instant Message that will open the front door. It is somewhat mind boggling where this is all going. It is quite […]

Alphabet attacks

Following my last post which was on security I was sat in the Timico NOC today and interestingly watched a SPAM attack in progress. It was an alphabet attack. This is one where someone’s email server is compromised and used to send out SPAM by rotating through the alphabet for email addresses (eg [email protected] – […]

It’s all about Security, Security, Security

I enjoy this business so much because of the wonderful diversity it provides me in terms of issues, problems and successes. The latest is the fact that the firewall at our corporate headquarters has been the subject of a number of attacks by some unfriendly person. These attempts to break into corporate networks happen millions of times […]

“Stealing” domain names is just not cricket

Businesses need to be mindful of the need to manage their domain name strategy sensibly. There are any number of individuals and organisations out there ready to take advantage of the careless. For example take a look at http://www.cricinfo.com/. Not a bad time to be visiting the site during an exciting match between England and […]

Disaster recovery in action – Timico style

It’s not very often I get excited about an ISDN line going down. This is what happened today at Timico Headquarters in Newark. Apparently becausewe are currently going through normal summer weather (that’s normal hot not normal British wet) the BT telephone exchange in Newark began to overheat. The BT response to this was to […]

Access control meets www – and it’s not what you think

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship […]

Access control meets www – and it's not what you think

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship […]

Supernode Discovery

I am quite excited because I think I might have discovered a Supernode. A Skype Supernode that is.   Skype doesn’t have it’s own network infrastructure. Instead as a peer to peer technology it takes data from Skype clients around the world and identifies which users have plenty of bandwidth and processing power available. This user then […]

Network Security

One subject that is dear to the heart of a major corporation is network security. One often hears anecdotal evidence of the huge steps companies take to protect their intellectual property. I even knew a company whose boardroom was “secure” and had regular scans for listening devices. Also there have been a number of high […]