Tag: security

End Usersecurity

Intro & Password Pain by @LindseyAnnison

By: Lindsey Annison | Wednesday, 15 January, 2014

I’m grateful to Tref for leaving the corporate treadmill and embarking on this new venture.  Although he never appeared to hate, or even dislike, his day job as some others in the industry seem to (in fact, having seen him in situ in the Timico offices several times, he seemed to positively revel in it!), I am very much...

0
End Useronline safetysecurity

Eventbrite security really on the ball – Adobe hack

By: Trefor Davies | Monday, 18 November, 2013

Had an email from Eventbrite yesterday with the subject “Keeping your account protected”. Fair play to them. Eventbrite have looked at the 3 million user name email addresses recently hacked at Adobe and cross referred them to any in use on the Eventbrite platform. They have then let the Eventbrite users with these identical email addresses subs. I was...

0
Engineeronline safety

More on Team Cymru

By: Trefor Davies | Tuesday, 5 November, 2013

Seeing as  I mentioned Team Cymru (Teem Come-ree) yesterday I just noticed that I’ve had their quarterly newsletter (Cymru Quarterly) on my desk since June. This is a personalized high quality newsletter that I specifically signed up for. I remember when doing so they asked me a second time whether I really wanted the newsletter in hard copy. I...

0
Engineerpeeringsecurity

Team Cymru – the correct pronounciation

By: Trefor Davies | Monday, 4 November, 2013

On a completely different note whilst I was at the Euro-IX conference last week someone gave a talk that included something about Team Cymru. Team Cymru are a top bunch of guys in the cyber security space. However there is something that urgently needs addressing about the organisation and that is how you pronounce their name. I’ve been hearing...

0
Engineersecurity

Is Huawei in your network a national security concern?

By: Trefor Davies | Tuesday, 23 July, 2013

I am reminded that yesterday’s post on how would Huawei spy on your network has an additional dimension in the UK in that a significant chunk of BT’s 21CN infrastructure is based on the Chinese vendor’s kit. I hadn’t noticed that this hit the headlines a couple of months ago. The BT Huawei deal would have been based on...

0
Businesssecurityvoip

How to make your VoIP secure #fraud

By: Trefor Davies | Thursday, 24 January, 2013

It’s a pretty simple process to set up your own VoIP phone system. Google “free VoIP server” and you will find links to 3CX or Asterisk. Download their free software and install it on a computer in your office. Sign up for a few SIP trunks from an Internet Telephony Service Provider (eg Timico) and you can be up...

0
EngineerUCvoip

S3 SBC, rhymes with VoIP, Securitee – Session Border Controller @Genband @Timico

By: Trefor Davies | Wednesday, 9 January, 2013

Yesterday I wrote about our new mobile VoIP App for the iPhone. This included a link to a press release issued by Genband, our VoIP infrastructure partner. That release covered more than just the mobile VoIP iPhone App. It is a bit of an overall solution release but an important bit covers our acquisition of the Genband S3 Session...

0
BusinessRegssecurity

Now where did I leave that important information? #commsdatabill

By: Trefor Davies | Monday, 8 October, 2012

You will of course recall my recent post on Big Data in which I related how many laptops are left in the back of taxis. 10,857.14 of them every year to be precise. Well I was wrong. Not only did I underestimate how many cabs there are in London but the average number of laptops left in them every...

0
datacentreEnd User

#rebelwithoutacause and other lyrical waxings

By: Trefor Davies | Wednesday, 29 August, 2012

There’s a definite change in the air. The short British summer is coming to a close, people are squeezing in their last bits of holiday before school starts again and my kids are getting ready to set off for university, in one case, for the first time (yes I am excited). It feels as if this is the last...

0
Businessolympics

How VIPs got around during the Olympics – security hard undebelly

By: Trefor Davies | Sunday, 19 August, 2012

We were walking through London to Hyde Park for the Blur gig and saw several of these convoys driving along Picadilly. I guess they were ferrying VIPs from their 5 star hotels on Park Lane to the Closing Ceremony at the Olympic Park. The cops took no prisoners and were pretty aggressive with pedestrians and other cars that didn’t...

0
BusinessNetolympics

Logistics & Security at the London2012 Olympics

By: Trefor Davies | Saturday, 4 August, 2012

Travel to and from the games: – a joy – the train to Cardiff was standing room only but we had booked seats – no problem. I travelled back in first class early the next morning with the lad so don’t know how the people up the back were. Most of the fans from the previous night will have either...

0
Businesssecurity

Infosec Europe – the stuff you really need to know

By: Trefor Davies | Wednesday, 25 April, 2012

En route to Earls Court yesterday for the Infosec show I had a bit of time on my hands whilst waiting for a work colleague’s train to turn up so I took the header photo with my Samsung Galaxy S2. It’s interesting to see how people naturally spaced themselves out so that there was an equal gap between them and...

0
CloudEnd Usersecurity

Innovation #1259 The Pocket Cloud – security issues answered

By: Trefor Davies | Tuesday, 12 July, 2011

The fiendishly clever engineers at my place of work have come up with a new innovation, The Pocket Cloud. The Pocket Cloud (pat pending TM applied for etc) is a highly innovative means of storing important business critical content in a totally secure manner. Built in security features include an USB connection – this is a totally wireless free...

0
AppsBusinessCloudmobile connectivity

Consumerisation of the workplace

By: Trefor Davies | Wednesday, 6 April, 2011

Not so long ago consumers would peer in through the smoked glass panoramic windows of business to admire and envy the tools that were available to those inside. Access to the internet was for most people above a certain age first experienced at work. Their first PC, first mobile phone, first email, first mobile email! The list is a...

0
Businesssecurity

Internet security – a synonym for sleepless nights

By: Trefor Davies | Monday, 7 September, 2009

How do we sleep at nights? Everywhere I turn I seem to come across security issues relating to my use of the internet. In catching up on my reading I find that a team of Japanese researchers have figured out how to crack the WPA encryption technology that up until now I had considered to offer my home wireless...

0
Businessscamssecurity

Top Ten Security Risks For Business

By: Trefor Davies | Monday, 22 September, 2008

These are the risks as seen by Timico engineers in their travels around our customer base together with a few of my own real world observations. This list is not authoritative but it should be insightful and if you are the owner or IT manager of a small or medium sized business then you could do worse than read...

0
Businessdatacentresecurity

Security, security, security

By: Trefor Davies | Monday, 4 August, 2008

I enjoy this business so much because of the wonderful diversity it provides me in terms of issues, problems and successes. The latest is the fact that the firewall at our corporate headquarters has been the subject of a number of attacks by some unfriendly person. These attempts to break into corporate networks happen millions of times daily around the world...

0
End Userinternet

"Stealing" domain names is just not cricket

By: tref | Saturday, 2 August, 2008

Businesses need to be mindful of the need to manage their domain name strategy sensibly. There are any number of individuals and organisations out there ready to take advantage of the careless. For example take a look at http://www.cricinfo.com/. Not a bad time to be visiting the site during an exciting match between England and South Africa (yes I...

0
Businessinternetsecurity

“Stealing” domain names is just not cricket

By: Trefor Davies | Saturday, 2 August, 2008

Businesses need to be mindful of the need to manage their domain name strategy sensibly. There are any number of individuals and organisations out there ready to take advantage of the careless. For example take a look at http://www.cricinfo.com/. Not a bad time to be visiting the site during an exciting match between England and South Africa (yes I...

0
AppsBusinesssecurity

Access control meets www – and it's not what you think

By: tref | Friday, 18 July, 2008

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship with a company called...

0
AppsBusinesssecurity

Access control meets www – and it’s not what you think

By: Trefor Davies | Friday, 18 July, 2008

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship with a company called...

0

© Copyright 2014 Trefor.net

Tag: security

End Usersecurity

Intro & Password Pain by @LindseyAnnison

By: Lindsey Annison | Wednesday, 15 January, 2014

I’m grateful to Tref for leaving the corporate treadmill and embarking on this new venture.  Although he never appeared to hate, or even dislike, his day job as some others in the industry seem to (in fact, having seen him in situ in the Timico offices several times, he seemed to positively revel in it!), I am very much...

0
End Useronline safetysecurity

Eventbrite security really on the ball – Adobe hack

By: Trefor Davies | Monday, 18 November, 2013

Had an email from Eventbrite yesterday with the subject “Keeping your account protected”. Fair play to them. Eventbrite have looked at the 3 million user name email addresses recently hacked at Adobe and cross referred them to any in use on the Eventbrite platform. They have then let the Eventbrite users with these identical email addresses subs. I was...

0
Engineeronline safety

More on Team Cymru

By: Trefor Davies | Tuesday, 5 November, 2013

Seeing as  I mentioned Team Cymru (Teem Come-ree) yesterday I just noticed that I’ve had their quarterly newsletter (Cymru Quarterly) on my desk since June. This is a personalized high quality newsletter that I specifically signed up for. I remember when doing so they asked me a second time whether I really wanted the newsletter in hard copy. I...

0
Engineerpeeringsecurity

Team Cymru – the correct pronounciation

By: Trefor Davies | Monday, 4 November, 2013

On a completely different note whilst I was at the Euro-IX conference last week someone gave a talk that included something about Team Cymru. Team Cymru are a top bunch of guys in the cyber security space. However there is something that urgently needs addressing about the organisation and that is how you pronounce their name. I’ve been hearing...

0
Engineersecurity

Is Huawei in your network a national security concern?

By: Trefor Davies | Tuesday, 23 July, 2013

I am reminded that yesterday’s post on how would Huawei spy on your network has an additional dimension in the UK in that a significant chunk of BT’s 21CN infrastructure is based on the Chinese vendor’s kit. I hadn’t noticed that this hit the headlines a couple of months ago. The BT Huawei deal would have been based on...

0
Businesssecurityvoip

How to make your VoIP secure #fraud

By: Trefor Davies | Thursday, 24 January, 2013

It’s a pretty simple process to set up your own VoIP phone system. Google “free VoIP server” and you will find links to 3CX or Asterisk. Download their free software and install it on a computer in your office. Sign up for a few SIP trunks from an Internet Telephony Service Provider (eg Timico) and you can be up...

0
EngineerUCvoip

S3 SBC, rhymes with VoIP, Securitee – Session Border Controller @Genband @Timico

By: Trefor Davies | Wednesday, 9 January, 2013

Yesterday I wrote about our new mobile VoIP App for the iPhone. This included a link to a press release issued by Genband, our VoIP infrastructure partner. That release covered more than just the mobile VoIP iPhone App. It is a bit of an overall solution release but an important bit covers our acquisition of the Genband S3 Session...

0
BusinessRegssecurity

Now where did I leave that important information? #commsdatabill

By: Trefor Davies | Monday, 8 October, 2012

You will of course recall my recent post on Big Data in which I related how many laptops are left in the back of taxis. 10,857.14 of them every year to be precise. Well I was wrong. Not only did I underestimate how many cabs there are in London but the average number of laptops left in them every...

0
datacentreEnd User

#rebelwithoutacause and other lyrical waxings

By: Trefor Davies | Wednesday, 29 August, 2012

There’s a definite change in the air. The short British summer is coming to a close, people are squeezing in their last bits of holiday before school starts again and my kids are getting ready to set off for university, in one case, for the first time (yes I am excited). It feels as if this is the last...

0
Businessolympics

How VIPs got around during the Olympics – security hard undebelly

By: Trefor Davies | Sunday, 19 August, 2012

We were walking through London to Hyde Park for the Blur gig and saw several of these convoys driving along Picadilly. I guess they were ferrying VIPs from their 5 star hotels on Park Lane to the Closing Ceremony at the Olympic Park. The cops took no prisoners and were pretty aggressive with pedestrians and other cars that didn’t...

0
BusinessNetolympics

Logistics & Security at the London2012 Olympics

By: Trefor Davies | Saturday, 4 August, 2012

Travel to and from the games: – a joy – the train to Cardiff was standing room only but we had booked seats – no problem. I travelled back in first class early the next morning with the lad so don’t know how the people up the back were. Most of the fans from the previous night will have either...

0
Businesssecurity

Infosec Europe – the stuff you really need to know

By: Trefor Davies | Wednesday, 25 April, 2012

En route to Earls Court yesterday for the Infosec show I had a bit of time on my hands whilst waiting for a work colleague’s train to turn up so I took the header photo with my Samsung Galaxy S2. It’s interesting to see how people naturally spaced themselves out so that there was an equal gap between them and...

0
CloudEnd Usersecurity

Innovation #1259 The Pocket Cloud – security issues answered

By: Trefor Davies | Tuesday, 12 July, 2011

The fiendishly clever engineers at my place of work have come up with a new innovation, The Pocket Cloud. The Pocket Cloud (pat pending TM applied for etc) is a highly innovative means of storing important business critical content in a totally secure manner. Built in security features include an USB connection – this is a totally wireless free...

0
AppsBusinessCloudmobile connectivity

Consumerisation of the workplace

By: Trefor Davies | Wednesday, 6 April, 2011

Not so long ago consumers would peer in through the smoked glass panoramic windows of business to admire and envy the tools that were available to those inside. Access to the internet was for most people above a certain age first experienced at work. Their first PC, first mobile phone, first email, first mobile email! The list is a...

0
Businesssecurity

Internet security – a synonym for sleepless nights

By: Trefor Davies | Monday, 7 September, 2009

How do we sleep at nights? Everywhere I turn I seem to come across security issues relating to my use of the internet. In catching up on my reading I find that a team of Japanese researchers have figured out how to crack the WPA encryption technology that up until now I had considered to offer my home wireless...

0
Businessscamssecurity

Top Ten Security Risks For Business

By: Trefor Davies | Monday, 22 September, 2008

These are the risks as seen by Timico engineers in their travels around our customer base together with a few of my own real world observations. This list is not authoritative but it should be insightful and if you are the owner or IT manager of a small or medium sized business then you could do worse than read...

0
Businessdatacentresecurity

Security, security, security

By: Trefor Davies | Monday, 4 August, 2008

I enjoy this business so much because of the wonderful diversity it provides me in terms of issues, problems and successes. The latest is the fact that the firewall at our corporate headquarters has been the subject of a number of attacks by some unfriendly person. These attempts to break into corporate networks happen millions of times daily around the world...

0
End Userinternet

"Stealing" domain names is just not cricket

By: tref | Saturday, 2 August, 2008

Businesses need to be mindful of the need to manage their domain name strategy sensibly. There are any number of individuals and organisations out there ready to take advantage of the careless. For example take a look at http://www.cricinfo.com/. Not a bad time to be visiting the site during an exciting match between England and South Africa (yes I...

0
Businessinternetsecurity

“Stealing” domain names is just not cricket

By: Trefor Davies | Saturday, 2 August, 2008

Businesses need to be mindful of the need to manage their domain name strategy sensibly. There are any number of individuals and organisations out there ready to take advantage of the careless. For example take a look at http://www.cricinfo.com/. Not a bad time to be visiting the site during an exciting match between England and South Africa (yes I...

0
AppsBusinesssecurity

Access control meets www – and it's not what you think

By: tref | Friday, 18 July, 2008

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship with a company called...

0
AppsBusinesssecurity

Access control meets www – and it’s not what you think

By: Trefor Davies | Friday, 18 July, 2008

When I began this blog I intended to cover subjects that I felt would be of general interest to users of business communications services in the UK – Timico customers generally. I didn’t think that this would for one moment include the topic of door entry systems. It does. Some time ago we began a relationship with a company called...

0