<?xml version="1.0" encoding="UTF-8"?>
<!--Generated by Site-Server v6.0.0-074e8c5d709f19c20cba39bbd1429d59fe380d5d-1 (http://www.squarespace.com) on Sat, 24 Sep 2022 21:19:10 GMT
--><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://www.rssboard.org/media-rss" version="2.0"><channel><title>Blog- INCA Networks</title><link>https://inca.ie/blog-page/</link><lastBuildDate>Thu, 01 Oct 2020 15:24:03 +0000</lastBuildDate><language>en-IE</language><generator>Site-Server v6.0.0-074e8c5d709f19c20cba39bbd1429d59fe380d5d-1 (http://www.squarespace.com)</generator><description><![CDATA[]]></description><item><title>How 5G and IoT expands the attack surface of a Network</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 22 Oct 2020 10:48:00 +0000</pubDate><link>https://inca.ie/blog-page/how-5g-and-iot-expands-the-attack-surface-of-a-network</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f5f618f82f5d20704cac9c9</guid><description><![CDATA[&nbsp;<p class="">The fifth generation (5G) of cellular phone technology is upon us. You can hardly turn on your TV or stream a YouTube video without seeing an advertisement for 5G. Beyond the speed and latency advantages that 5G will offer for consumer mobile devices, the Internet of Things (IoT) will benefit from 5G’s capability to support many more simultaneous connections. With a much wider pipe—with up to 20 times the capacity of 4G (minimum peak data rate of 20&nbsp;Gbps versus 1&nbsp;Gbps)—5G&nbsp;can support many more simultaneous connections. And the&nbsp;invention of 5G&nbsp;allows for network latencies as low as 1&nbsp;millisecond, up to 10 times greater than 4G. Ubiquitous IoT devices, such as sensors in vehicles, traffic lights, and roadbeds, will benefit from performance increases in 5G and make possible sci-fi use cases, including autonomous&nbsp;automotive&nbsp;applications.</p><p class="">But along with all the great benefits of speed, throughput, low latency, and futuristic functionality comes a downside: an expanded attack surface. With the&nbsp;forecast of connected IoT devices&nbsp;and applications estimated to exceed 67 billion by 2025—perhaps up to 75 billion—the field is rife with targets. And because many&nbsp;vulnerable IoT devices&nbsp;ship with default passwords that are rarely changed and ports that always seem to be open, for hackers, it’s like shooting fish in a barrel. The process of&nbsp;securing IoT devices, like any software development process, is also vulnerable to design flaws and coding mistakes.</p><p class="">However, not every 5G vulnerability can be laid at the doorstep of IoT devices. With new 5G wireless technology replacing older 4G LTE technology, uncertainties and risks can abound within the 5G protocols themselves. And because 5G standards are relatively young, with their definitions still evolving, 5G and IoT devices will&nbsp;need better security.</p><h2>Would 5G and IoT cyber security compliance standards help?</h2><p data-rte-preserve-empty="true" class=""></p><p class="">Cyber security&nbsp;compliance standards for 5G and IoT devices can have overlapping jurisdictions in terms of applications and sectors. For example, the&nbsp;Payment Card Industry Data Security Standard (PCI DSS)&nbsp;applies to 5G networks and IoT devices involved in financial transactions conducted with credit or debit cards, and the&nbsp;FedRAMP&nbsp;cyber security standards apply to transactions involving the federal government. However, the evolving status of 5G standards and fast-changing nature of IoT devices make these kinds of compliance rules and regulations “very cumbersome and overweight,” according to&nbsp;<a href="https://www.protocol.com/5g-cybersecurity-akamai" target="_blank">Protocol</a>, and not designed for environments that change regularly.</p><p class="">Nevertheless, the need to&nbsp;manage the risk of billions of IoT devices&nbsp;will continue to change the requirements and scope of 5G security. Consequently, development organizations need a proven, scalable, standards-based technology solution going forward, according to&nbsp;Risk &amp; Insurance.</p><p class="">The National Institute of Standards and Technology (NIST) recently posted a set of draft recommendations regarding IoT cyber security. Though not enforceable, it calls for IoT manufacturers to design cyber security capabilities into their systems, including baselines for data protection, logical access to interfaces, software and firmware updates, and cyber security state awareness.</p><p class="">Even in existing technologies, researchers continue to discover unknown problems. For example, researchers at the Korea Institute of Science and Technology&nbsp;discovered 36 security flaws in 4G&nbsp;last year. So the&nbsp;reality of 5G&nbsp;is that as a new technology, it’s bound to have security vulnerabilities.</p><h3><strong><br>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>


&nbsp;


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1600087742383-RPS3AF7LJPBC5JLVB1JB/IoT-and-5G.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">How 5G and IoT expands the attack surface of a Network</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #5</title><dc:creator>Ed Campbell</dc:creator><pubDate>Wed, 14 Oct 2020 11:22:00 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-5</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f58bbf1547462083e995820</guid><description><![CDATA[&nbsp;<h3>Don’t Share Confidential Information Over Zoom</h3><p class="">The popularity of applications like Zoom and House Party has exploded in recent weeks, however, there are concerns with the security of some applications.&nbsp;<br><br><em>“The decision to use Zoom, as millions of others stuck at home during the coronavirus outbreak are doing, comes as concerns are growing about the conferencing app's business model and security practices. Most notably, the company has been forced to admit that although it explicitly gives users the option to hold an “end-to-end encrypted” conversation and touts end-to-end encryption as a key feature of its service, in fact it offers no such thing. Specifically, it uses TLS, which underpins HTTPS website connections and is significantly better than nothing. But it most definitely is not end-to-end encryption (E2E). E2E ensures all communications are encrypted between devices so that not even the organization hosting the service has access to the contents of the connection. With TLS, Zoom can intercept and decrypt video chats and other data.”&nbsp; - </em><strong>The Register</strong></p><p class="">‍</p><p class="">It is thus advised to treat any confidential conversations held over Zoom as being vulnerable to being overheard. Of course, the other issue is that unlike face-to-face conversations in an office environment, you have to assume all online conversations are being recorded. </p><h3>‘Zoom bombing’ on the rise</h3><p class="">On 30 March, the&nbsp;<a href="https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic">FBI announced</a>&nbsp;it was investigating increased cases of video hijacking, also known as “Zoom-bombing”, in which hackers infiltrate video meetings, often shouting racial slurs or threats.</p><p class="">Zoom meetings can be accessed by a short number-based URL, which can easily be generated and guessed by hackers, a January&nbsp;<a href="https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/">report</a>&nbsp;from the security firm Checkpoint found. A number of security flaws affecting Zoom have been reported in the past and as recently as this week. In 2019,&nbsp;<a href="https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5">it was revealed</a>&nbsp;Zoom had quietly installed a hidden web server on user devices that&nbsp;<a href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">could allow</a>&nbsp;the user to be added to a call without their permission. </p><h3><strong><br>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3><p data-rte-preserve-empty="true" class=""></p>


&nbsp;


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599650808880-QDRESL1F1W577XAQQ24K/Zoom-Metting.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #5</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #4</title><dc:creator>Ed Campbell</dc:creator><pubDate>Tue, 13 Oct 2020 21:29:00 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-4</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f47c1ea032843199a999ecb</guid><description><![CDATA[&nbsp;<h3>Beware of Covid19 Related Phishing Scams</h3><p data-rte-preserve-empty="true" class=""></p><p class="">Covid19 has brought with it a raft of changes to almost every aspect of society and a lot of aspects of business. Phishing scams have also changed and evolved to include Covid19 related scams. Only use Government approved sites for Covid-19 information and updates. There are lot of coronavirus-themed scams around that using phishing techniques to trick people into sharing personal information, such as banking details. A rule of thumb is not to trust any emails, social media, links or invitations that come from an unknown source or a source that don’t usually contact you digitally. Even if they do usually contact you digitally, if the information requested is important or very sensitive, think twice. Most institutions will never ask for banking details, or passwords through text or E-mail. It never hurts to double check with institutions to validate their contact. </p><h2><strong>How do I spot a coronavirus phishing email? Examples</strong></h2><p class="">Coronavirus-themed phishing emails can take different forms, including acting as though they are official health departments.</p><p class=""><strong>CDC alerts</strong>. Cybercriminals have sent phishing emails designed to look like they’re from the U.S. Centers for Disease Control. The email might falsely claim to link to a list of coronavirus cases in your area. “You are immediately advised to go through the cases above for safety hazard,” the text of one phishing email reads.</p><p class="">Take the time to check if an E-mail claiming to be a local or national health authority. In the case of a phishing scam often scammers will push you to download some sort of file or follow a link. Often, they will insist you “Act Now” and often be poorly written in terms of correct grammar. You can investigate where links go by hovering over them. </p><p data-rte-preserve-empty="true" class=""></p>


&nbsp;&nbsp;<h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>


&nbsp;<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598550620942-61TE2ESE5HULPJXQ0I7R/Legitimate-.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #4</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #2</title><dc:creator>Ed Campbell</dc:creator><pubDate>Wed, 07 Oct 2020 09:00:00 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-2</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f468374ad42e403eac5f4bf</guid><description><![CDATA[&nbsp;<h3>Improve Password Protection</h3><p class="">When a password is compromised, the threat actor can exploit the person’s authorisation levels to harvest potentially sensitive information or valuable company data. The use of Multi-Factor Authentication (MFA) is critical for home working, taking the basic security protocol of passwords to the next level. As the name suggests it, users have to provide two or more pieces of evidence to get through the authentication process. Consider moving employees on from short passwords to passphrases or even passwordless authentication, which sends users a one-time code or link via email of text.</p><h3>How to create a strong password</h3><p class="">Follow these tips to help yourself craft unique, complex passwords.</p><p class="">Do not use personal information</p><p class="">Don’t use your name or names of family members or pets in your passwords. Don’t use numbers like your address, phone number, or birthdays, either. These can be publicly available, on forms you fill out or on social media profiles, and easily accessible to hackers.</p><p class="">Do not use real words</p><p class="">Password cracking tools are very effective at helping attackers guess your password. These programs can process every word in the dictionary, plus letter and number combinations, until a match is found. Steer clear of using real words from the dictionary or proper nouns or names.</p><p class="">Instead, use special characters. By combining uppercase and lowercase letters with numbers and special characters, such as “&amp;” or “$,” you can increase the complexity of your password and help decrease the chances of someone potentially hacking into your account.</p><p class="">Create longer passwords</p><p class="">The longer the password, the harder it may be to crack. Try for a minimum of 10 characters.</p>


<h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598456751472-YXCZXAQQMMUEMUVD3RQB/Working-from-home.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #2</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Tip #1</title><dc:creator>Ed Campbell</dc:creator><pubDate>Tue, 06 Oct 2020 09:04:00 +0000</pubDate><link>https://inca.ie/blog-page/-tip-1</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f4542bf91401e2a04ef923c</guid><description><![CDATA[&nbsp;<p class="">Covid19 has brought with it a host of changes to many aspects of life and work has been one of those aspects that have gone through a rapid transformation. In a very short period of time, home working and zoom meetings between teams have become the norm leaving Central Business District Office buildings empty. Unfortunately in many cases our home-networks aren't exactly optimised for the secure transaction of sensitive work details and information. In a lot of cases we ourselves aren't optimised for network security either, perhaps becoming a little more relaxed about network security procedures as we get used to working at home. Over the coming weeks, INCA networks will be offering 7 top tips to stay IT Secure when working from home.</p><h3>Top tip #1- Do not mix personal devices with work devices</h3><p class="">Employees should use work devices to access files, resources and applications rather than use their personal devices. As we all adapt to working at home, numerous devices are going to be required (particularly during lockdown) so it is common for families to share hardware such as Smartphones, laptops or tablets. Despite the temptation to share equipment, any work devices should be used exclusively for work purposes.</p>


<h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598374731414-I5AT3SGX0UU8WY9J17LI/Home-in-forrest.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Top Seven Security Tips For Working from Home - Tip #1</media:title></media:content></item><item><title>A Big Breach, A Very Big Breach In The Country: Maynooth University</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 01 Oct 2020 14:45:00 +0000</pubDate><link>https://inca.ie/blog-page/a-big-breach-a-very-big-breach-in-the-country-maynooth-university</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f5791a7f2eba344a940f56d</guid><description><![CDATA[&nbsp;<p class="">Maynooth University has very recently claimed it was the victim of an IT Security Attack in which data and records relating to students and alumni that had previously attended the college were taken. It has confirmed that Blackbaud (Maynooth University’s IT Security provider) were at the centre of an incident which involved a ransom being paid.</p><p class="">Blackbaud paid the cybercriminal’s demand with confirmation that the data copy they had taken from their network had been removed and destroyed. Maynooth University was not the only college to be affected by the same attack. NUIG was also a victim of the same cyber criminals and there were many other institutions involved that have not been made public. </p><h3>Opinion</h3><p class="">Cyber attacks involving a ransom being paid are a lot more common than the public are often made aware. Companies and institutions won’t often make public that they have been victims of an IT attack which involved a ransom being paid because quite simply, it’s not very good for their image. To Maynooth University’s credit they have come out and made public the incident, which may influence similar institutions and organisations to do the same in the future. It’s important to note here that, it was Maynooth University’s security provider that ultimately paid the ransom, and not the university itself. It raises a hugely important point, a “Sophie’s Choice” -like conundrum. When a cyber criminal successfully infiltrates a network and gains access (And in this case ,makes a copy of some rather sensitive data) should an organisation pay the ransom? Is it the correct and righteous action for an organisation to make? Is it the only action they <strong><em>can </em></strong>make. It sets a rather unsettling precedent, given that successful cyber criminals are likely to move bullishly on to their next “project’ buoyed by the knowledge their previous efforts were profitable. The alternative, which is unthinkable for most companies and organisations, is to let the criminals have the data, to let it be leaked out or exploited in whatever creative and damaging ways they come up with. For an organisation to suffer the penalties  for networks being breached and to let countless individuals that are associated with the organisation, whose data has been stolen, be completely vulnerable to a personal attack themselves. It doesn’t seem like much of an option, does it? </p><h3>Troubling Questions</h3><p class="">It raises a lot of troubling questions when large organisations and institutions are forced into a corner by bad actors and are forced to take care of these particular problems in such an uncouth way. Should companies budget to pay ransoms for Network or data breaches? Should they budget for repeat attacks? Do cyber criminals have a more talented “Workforce” than the IT Security sector? Well this particular question is perhaps unfair. Of course cyber criminals aren’t more talented than IT Security technicians, it just so happens that not being bound by morals or any code of integrity means they have a lot of wiggle room when it comes to achieving their “Goals”. </p><p data-rte-preserve-empty="true" class=""></p><h3>Answers</h3><p class="">As with any great quandary that troubles any industry or country or generation, the answer doesn’t lie with any one person, institution or organisation. The answer to this particular problem lies with every company that keeps sensitive data on their network and also with the employees and members of the public that let their information be kept on an institution and also with the IT Sector as a whole. It’s incredibly important that every organisation relying on its network is committed to best practice and is absolutely committed to finding and mitigating threats before they occur and not after. It’s incorrect to say that all IT Security attacks are preventable. The complexity of both Network designs and a bad actor’s approach means that sometimes, a successful breach of a network is the only way the IT Security sector can learn about new threats or techniques. However it’s important to note that most network breaches are preventable or at least their repercussions mitigated by being obsessively <strong><em>“Network Hygienic” </em></strong>. Businesses in general have to be aware of the price of having such a powerful tool as a business network. </p><p data-rte-preserve-empty="true" class=""></p><p data-rte-preserve-empty="true" class=""></p><p class="">Whatever the case may be institutions paying ransoms to cyber criminals for data breaches is not a sustainable model for most businesses or institutions. The coming years in the IT Security sector, will be about learning to what extent we can prevent, not react. </p><p class=""><br></p><h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact us today
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />&nbsp;]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599574489367-2Q3WDP753NVY7I6N1339/A-Big-Big-Breach%2C-a-very-big-breach.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">A Big Breach, A Very Big Breach In The Country: Maynooth University</media:title></media:content></item><item><title>IoT and the Risk of Third party Components  </title><dc:creator>Ed Campbell</dc:creator><pubDate>Mon, 14 Sep 2020 12:19:06 +0000</pubDate><link>https://inca.ie/blog-page/iot-and-the-risk-of-third-party-components</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f5f1f04e9d120579b24bf6f</guid><description><![CDATA[<p class="">Third-party software components are essential part of every IoT device. There’s no IoT device without third-party components. Common third-party components are:</p><ul data-rte-list="default"><li><p class="">Communication libraries (Bluetooth, Wi-Fi) </p></li></ul><ul data-rte-list="default"><li><p class="">Encryption libraries (i.e., wolfcrypt) </p></li><li><p class="">Operating System </p></li><li><p class="">Open source tools </p></li><li><p class="">Different communication protocols (zigbee, mqtt) </p></li><li><p class="">Chip/module manufacturer components – the software within the communication modules, i.e. Broadcom, Qualcomm, Sierra etc. </p></li></ul><p class="">Despite best efforts, even a well designed IoT device is likely to have a 3rd party vulnerability inherent in it’s design. The vulnerability might exist in the device’s operating system or – as crazy as it sounds – within the encryption library itself. In such cases, your device is completely exposed to cyber-attacks, regardless of the best practices that have been used. </p><p data-rte-preserve-empty="true" class=""></p><p class="">On one hand, vulnerability in a third-party component is very dangerous. In many IoT devices, there is no separation and segmentation between processes and/or tasks, which means that a vulnerability in one third-party library leads to compromising the entire device. When no user-kernel architecture exists, this could lead to lethal results. Even if such architecture does exist, attackers can still leverage the third-party vulnerability, take control over the device and cause damage.</p><h3>How to mitigate against device vulnerabilities.</h3><p class="">it’s hard to eradicate vulnerabilities when it comes to third party components in IoT devices but there are some best practice guidelines to follow. </p><p class="">-Keeping your device up to date is extremely important. Organisations that have patched the vulnerability on time did not suffer from the consequences of the attack. </p><p class="">-New version releases for each of your components, in order to update them as quickly as possible. </p><p class="">-New security issues (CVEs) to make sure your components aren’t exposed to hacking. </p><h3><strong><br>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>


<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" /><meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact us today
  </a>]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1600085922973-ALYSD6E5ITOS18FSPAB6/3rd-party-IoT.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">IoT and the Risk of Third party Components</media:title></media:content></item><item><title>Is a SIEM solution going to break the bank for my business?</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 10 Sep 2020 19:10:54 +0000</pubDate><link>https://inca.ie/blog-page/is-a-siem-solution-going-to-break-the-bank-for-my-business</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f5a37295d20ec4cb35d03df</guid><description><![CDATA[<p class="">Formatting readable data has for a long time been seen as a costly, time-intensive project beset by roadblocks. However the next generation of SIEM solutions have been hailed as a cost effective, more flexible and scalable and more accessible to small business. But let’s go back a step for a second. What exactly is a SIEM solution, and why on earth does your small to mid sized company need it?</p><p class=""><br></p><p class="">Security information and event management, or SIEM for short, is an early warning system for possible incidents. Think of SIEM like panning for gold: this is about throwing out the rocks and picking the nuggets of information that could indicate a breach. It can be a hugely valuable tool in your companies IT Security arsenal, scouting out threats in the early stages before they become bigger, uglier events.  </p><p class=""><br></p><p class="">If your company deals with sensitive information, or holds information regarding customers, a SIEM solution of some scale will be a great addition to your IT Security system. It might also be mandatory to make your company data protection compliant. The question of size of company, or number of events on a network isn’t as relevant as the size of the the risks posed to your network. Would a cyber security breach have the potential to put your company out of business? If so, you might want to think about a SIEM. </p><p class=""><br></p><p class="">How does SIEM work?</p><p class="">SIEM tools can give a level of automation and machine learning to your Log Management protocol. This can help your IT team focus on the activities in early development which may turn into threats/breach as opposed to manually having to dig through logs and find certain activities or patterns. A SIEM solution can learn over time which threats/activities are most significant to your business. </p><p class=""><br><strong>Thanks for reading.. </strong></p><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>


<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/contact-us" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact Us Today
  </a>]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599765042398-ZDWC9J0SJFQ7SQIFNZ9A/Piggy-Bank-SIem.netsoc.io.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">Is a SIEM solution going to break the bank for my business?</media:title></media:content></item><item><title>Impersonation Attacks</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 10 Sep 2020 11:52:43 +0000</pubDate><link>https://inca.ie/blog-page/impersonation-attacks</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f59f9b235e751014cc34bb4</guid><description><![CDATA[<p class="">Impersonation attacks are a socially engineered breach, where an attacker may spend months researching and building up a credible employee profile in order to gain access to a network, or demand payment from somewhere in the company. </p><p class="">They can be very difficult to detect as, generally work places are fast paced environment where a lot of information needs to be transferred quickly between employees. Checking an E-mail address for typos doesn’t seem like a good use of company time, especially when we send E-mails to that address every single day.  Practice makes perfect with regard to scanning each E-mail your receive to make sure the address isn’t a close copy/fake.</p><p class="">The major reason these attacks are difficult to be detected by users is lack of attention to detail. Let’s understand this through an example:</p><p class="">Below is the same email address written twice, how fast can you spot the one with some error?</p><p class="">eeryaeel@reveantivirus.com</p><p class="">eeryaeel@reventivirus.com</p><p class="">It is hard to figure out the irregularity, especially when you have a hectic schedule at work and many distractions.</p><p data-rte-preserve-empty="true" class=""></p><p class=""><strong>Executing the Attack</strong></p><p class="">The final and the most important step is to choose a type of attack. Below mentioned are top 3 tactics used by attackers:</p><ul data-rte-list="default"><li><p class=""><strong>By Registering a Look-Alike Email Domain</strong></p></li></ul><p class="">The attacker can register a similar email domain and create a new email ID using a similar name to the person being impersonated. The attacker sends an email message to the target asking them to respond urgently. For instance, impersonating the target’s boss, the attacker creates an email id&nbsp;Smith@reventivirus.com&nbsp; and asks the victim to make urgent payment for an invoice attached with the message. &nbsp;</p><ul data-rte-list="default"><li><p class=""><strong>Editing the Display Name</strong></p></li></ul><p class="">The majority of the mobile email clients only show the display name of the sender. This makes it quite easy for the attacker to edit their display name and trap the victim into their game. For example, the attacker sends the message using an email like&nbsp;xyz@gmail.com&nbsp;but edits the display name to the person being impersonated. The increasing mobile trend contributes to the success of such attacks. However, in desktop email clients, both the display name and email id of the receiver are shown, which is why the chances of falling for an attack are less.</p><ul data-rte-list="default"><li><p class=""><strong>Using a Free Email Account</strong></p></li></ul><p class="">A common tactic used by attackers. They send a message through a free email account such as Gmail, Yahoo, etc. In the email, the sender indicates that they have been locked out of their official account and need immediate help in order to get a task done.</p><p data-rte-preserve-empty="true" class=""></p><h2>How to Beat Impersonation Attacks</h2><p class="">&nbsp;</p><p class=""><strong> Awareness Training</strong></p><p class="">Attention to detail can be a lot of help&nbsp;in combating cases of impersonation. Users should check sender details carefully. Any suspicious email message should be investigated before replying. Also, proper attention should be given to the message content, including attachments and URLs. Businesses should step forward in providing proactive cyber security awareness training to their employees.</p><p data-rte-preserve-empty="true" class=""></p><h3><strong><br>Thanks for reading.. </strong></h3><p data-rte-preserve-empty="true" class=""></p><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>


<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/contact-us" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact us today
  </a>]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599751947766-TXK7UMUVQEGBCTO4P1AX/Invoice-Paid.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">Impersonation Attacks</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #7</title><dc:creator>Ed Campbell</dc:creator><pubDate>Wed, 09 Sep 2020 16:41:36 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-7</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f59047e89feea34f544357f</guid><description><![CDATA[&nbsp;<h3>Avoid sharing too much on social media.</h3><p class=""><br><br></p><p class="">People are engaging more on social media to break the work-from-home monotony. However, you must always keep your IT security in mind. Be particularly careful not to inadvertently give away clues as to passwords or work details when you share messages on social media. It can be easy to include sports teams, hobbies, important dates in our Bio, but if that’s the case, keep those pieces of information far far away from your passwords!</p><p class="">Clicking pictures of the office and telling people exactly where you are or when you’re going to be there can be a little risky too. We all do it, but make sure before doing so that you aren’t opening yourself up to a breach by giving that information! </p><p class="">Can you spot errors of judgement that a cyber criminal might be able to manipulate on Dan’s Twitswoo profile?</p>


















  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
              <img class="thumb-image" data-image="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1602754209122-2YJK06QI6D5681T6V97B/Danthemarmite-man.png" data-image-dimensions="1500x795" data-image-focal-point="0.5,0.5" alt="Danthemarmite-man.png" data-load="false" data-image-id="5f8816a0a73f01522c2a6ac4" data-type="image" src="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1602754209122-2YJK06QI6D5681T6V97B/Danthemarmite-man.png?format=1000w" />
            
          
        
          
        

        
      
        </figure>
      

    
  


  


<ol data-rte-list="default"><li><p class="">Dan’s given his work E-mail on his public profile. This gives hackers a head-start when trying to get into his E-mails.</p></li><li><p class="">Dan has let potential hackers know that he’s not a fan of secondary authorisation apps like “Google Authy”. This lets hackers know that if they can somehow get Dan’s password, they’ll instantly have access to his e-mails. </p></li><li><p class="">Dan has left clues on his profile about what kind of numbers and phrases he might use in a password relating to his work e-mail.</p></li></ol><p data-rte-preserve-empty="true" class=""></p><p class="">Dan seems like a nice guy, but when it comes to information relating to his email and passwords he’s a little careless. When It comes to keeping secure on social media, don’t be like Dan. </p><h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page. </strong></h3>


&nbsp;<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1602755533437-RP7AFW9YF90C5JJ35STU/Danthemarmite-man.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #7</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #6</title><dc:creator>Ed Campbell</dc:creator><pubDate>Wed, 09 Sep 2020 13:43:19 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-6</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f58dc5f09a3a171e2ad4277</guid><description><![CDATA[<h3>Avoid Using USB Keys</h3><p class="">Okay! This one is short and sweet. At one time USB keys were very popular - particularly as branded giveaways at tradeshows. Over time it has been recognised that they do introduce risk and are thus best avoided particularly if you are gifted one. Instead, it is securer to use online company storage options like Google Drive, Dropbox, Box etc. </p><p class=""> USB keys add a layer of cyber security risk we don’t normally concern ourselves with. They’re physical things and they can be misplaced. It’s easy for USB containing tonnes of info to end up, well anywhere really. </p><p class="">USB keys are also not normally password protected, unless they’re clever ones. Meaning that it’s simple and straightforward to access that critical data. </p><p class="">Your best bet is to steer clear of this particular retro piece of office gear. </p><h3><strong><br>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page. </strong></h3>


<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />


  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>]]></description><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599659150213-WDC530NK83GUSVITE2R3/USB-Stick.png?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #6</media:title></media:content></item><item><title>IT Security and ROI</title><dc:creator>Ed Campbell</dc:creator><pubDate>Mon, 07 Sep 2020 13:40:14 +0000</pubDate><link>https://inca.ie/blog-page/it-security-and-roi</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f5636a3020c314b1fee3e2a</guid><description><![CDATA[&nbsp;<p class="">Cyber Security and ROI is a tricky one. The return on your investment, it's not profit. Implementing a solid cyber security plan isn't going to MAKE you money, in most cases. It will however, protect your company's bottom line in the long run and in some cases it might be the difference between your company existing at all or becoming insolvent. Breaches on your company's network can be devastating in a whole myriad of ways. Not only can data recovery abd crisis mitigation be an absolute money pit but It can also ruin client trust, destroy months of scheduling and ruin a hard built reputation and image.</p><p class="">When calculating the ROI of a particular IT Solution we need consider the follow.</p><p class="">Annualized Loss Expectancy (ALE) — The estimated amount of money that will be lost in a single security incident (single loss expectancy) multiplied by the estimated frequency that a threat will strike within a year (annualized rate of occurrence).</p><p class="">Mitigation Ratio — Unlike ALE, this is an approximate number. The best approach is to assess the predicted number of mitigated risks based on a scoring algorithm established in the organization. For example, a company is considering investing in a data discovery solution that is expected to reduce the current data security risk by 85%, so the mitigation ratio equals 85%.</p><p class="">Cost of Solution — This is the only independent index in this equation. It includes all costs associated with solution purchase, implementation and maintenance. High overall cost can easily negate the value of security investments, so it is important to evaluate ROSI before making a purchase.</p><p class="">Regularly measuring the effectiveness of cybersecurity efforts is essential to avoid security incidents. There are so many options on the market that IT professionals find it difficult to understand which ones are worth the investment and efforts for implementation.</p><p class="">Evaluation of basic security metrics can serve as a good starting point and bring even more benefits if organizations do this on a regular basis. Accurately calculated, security metrics will provide actionable data about how well current IT security strategy and investments are working, determine which areas need improvements, and evaluate proposed new security investments so organizations allocate budget wisely.</p><h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page. </strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1599485628312-1YW4OZOZMZLUNLZXWXZR/Thumbnail-ROI-blog.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="795"><media:title type="plain">IT Security and ROI</media:title></media:content></item><item><title>Ed's Post</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 12:55:26 +0000</pubDate><link>https://inca.ie/blog-page/eds-post2</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f47accc5a444b08456c8454</guid><description><![CDATA[<p class="">INCA Networks stand in support of the Black Lives Matter movement in its pursuit of equality in all aspects of society. INCA Networks condemns the police brutality and excessive force used against black communities, particularly in the United States of America. We also stand for equal opportunities for members of the black communities in the work place and for the eradication of prejudice and racism in all it's forms.</p><p class="">Regards, Ed. (Director)</p><p class="">==</p><h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page.</strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598532815318-CS1LGUAVFY4GLYITD83M/BLM.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Ed's Post</media:title></media:content></item><item><title>IoT and Ericsson Maritime ICT</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 10:30:50 +0000</pubDate><link>https://inca.ie/blog-page/iot-and-ericsson-maritime-ict</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f478a8d670f0560f119acff</guid><description><![CDATA[<p class="">Transforming the Shipping Industry with IoT Technologies Despite the fact that ships carried an estimated 9.6 billion tons of cargo in 2013, accounting for 80 percent of global trade by volume and more than 70 percent of global trade by value, the fragmented nature of the supply chain, from production to warehouse to shore to ship, has made it difficult for producers and transporters to effectively monitor their cargo between ports. And while shipping for centuries has connected faraway places, people and industries, the inherently isolated nature of ships at sea presents a unique set of logistical and connectivity challenges for the maritime industry as it seeks to deliver goods on time and in mint condition, and to ensure the safety of crews. The rise of IoT technologies has inspired the Swedish communications company Ericsson to tackle the dual challenges of supply-chain fragmentation and maritime-vessel isolation with one solution: the Ericsson Maritime ICT Cloud platform. The Maritime ICT Cloud provides shipping organizations with the ability to connect on a unified platform and to link those vessels onto the same network, allowing revolutionary data sharing within the organizational ecosystem. Sensors monitor everything from vessel location and speed to the status and temperature of refrigerated cargo containers, giving shipping companies and producers real-time information on their goods. Additionally, Ericsson’s system fosters unprecedented connectivity at nearly every part of the supply chain. The system not only monitors cargo and the ships that carry it, but also gives stakeholders across the industry the ability to obtain and analyze real-time data from production warehouse to final recipient. “This is a real game changer for the shipping industry,” said Douglas Watson, Ericsson’s director of shipping. “By connecting the entire supply chain into a single, integrated system, we can achieve an unprecedented level of efficiency from warehouse to customer. The Maritime ICT Cloud platform also allows us to make our ships safer and less expensive through real-time data analysis of potential dangers and inefficiencies.” The Maritime ICT Cloud also connects embedded engine- and hull-monitoring systems with bridge communications in a way that reduces inefficiencies, risks and overall cost, effectively delivering an Internet provider protocol for proprietary maritime systems and providing the connectivity for those systems. With satellite technology providing sea-toshore connectivity, stakeholders can make informed decisions to strengthen crew welfare,</p><p class="">protect goods in transit and maximize route efficiency. </p><p data-rte-preserve-empty="true" class=""></p><p class="">This means that there is an incredible amount of IoT data transfer and in some cases automated controls associated with IoT sensors (temperature controls for example). in the case of Ericsson Maritime ICT upgrading their fleet of freight operations on ships, it has helped them optimise their logistics but, as with any optimisation and automation, these optimisations give a myriad of opportunities for bad actors to access their data and controls.</p><h3><strong><br>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got It’s IoT covered? Don’t put it off. Contact Logz.ly today. </strong></h3>





  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact Logz.ly Today
  </a>]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598524244344-H9DMAG21KKOGN9ANLA1C/Ericsonn-case-study.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="789"><media:title type="plain">IoT and Ericsson Maritime ICT</media:title></media:content></item><item><title>An IoT Revolution</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 10:23:46 +0000</pubDate><link>https://inca.ie/blog-page/an-iot-revolution</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f4788bbc63e2033a29a9ec3</guid><description><![CDATA[&nbsp;<p class="">An IoT revolution has been bubbling away since 1999 but it appears that it’s beginning to hit boiling point. IoT is set to become a large part of operations infrastructure for businesses in the next 5 years and has already become part of daily routines for the vast majority of us.</p><p class="">How’s that?</p><h2><strong>Connected Vehicles&nbsp;</strong></h2><p class="">In 5G capabilities, a large IoT system may allow autonomous vehicles, transferring products or humans, to perform&nbsp; real-time tracking, monitoring, and data analysis to check performances. Automated repair facilities will evaluate a thorough check of devices for proper maintenance lowering chances of accidents. Self-driving vehicles have shown promising results in the early stage of testing although few infrastructure fallouts exist.</p><p data-rte-preserve-empty="true" class=""></p><p data-rte-preserve-empty="true" class=""></p><h2><strong>Connected Healthcare&nbsp;</strong></h2><p class="">With 5G speed and IoT architecture, the health industry might see large changes with remote patient treatments, medical procedures, robotic surgeries, quick processing of PET scanners, and swift consultations. A modern revolution with wearable health monitors will encourage patient awareness and empower the new age population towards better health</p><p data-rte-preserve-empty="true" class=""></p><h2><strong>Aerospace&nbsp;</strong></h2><p class="">These 5G and IoT enabled devices will offer a plethora of functionalities like health monitoring, inventory management, equipment maintenance, fleet management, and advanced analytics to help Aerospace industries to control operations.</p><p data-rte-preserve-empty="true" class=""></p><h2><strong>Monitoring&nbsp;</strong></h2><p class="">With IoT and 5G a dynamic smart environmental monitoring will bring a new era helping organizations and the government to cut down on their pollution, greenhouse gases, etc. Farmers can monitor and analyze their livestock, crops, and machinery with remote locations, chips, and sophisticated drones efficiently. Security and surveillance-based censor will be enhanced further with inter-connected devices offering impenetrable security for banks and other financial institutions.</p><p data-rte-preserve-empty="true" class=""></p><p class="">As the IoT landscape evolves one thing is certain, a growing number of devices will be connected to the internet and automated. </p><h3><strong><br>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got It’s IoT covered? Don’t put it off. Contact Logz.ly today. </strong></h3>


&nbsp;


  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact Logz.ly Today
  </a>]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598523944873-POLQN2LOE7FTRCV1452C/revolution-Logz.ly.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="789"><media:title type="plain">An IoT Revolution</media:title></media:content></item><item><title>The Industrial Internet of Things</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 10:10:41 +0000</pubDate><link>https://inca.ie/blog-page/the-industrial-internet-of-things</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f4785dc0f69b33a94ae59db</guid><description><![CDATA[&nbsp;<p class="">The Industrial Internet of Things (IIoT) takes networked sensors and intelligent devices and puts those technologies to use directly on the manufacturing floor, collecting data to drive artificial intelligence and predictive analytics.</p><p class="">“In IIoT technology, sensors are attached to physical assets,” says Robert Schmid, Deloitte Digital IoT chief technologist. “Those sensors gather data, store it wirelessly, and use analytics and machine learning to take some kind of action.”</p><p class="">The IIoT is driving unprecedented disruption in an industry that has struggled in recent years due to talent shortages, and this offers hope for the industry’s future. The IIoT can transform traditional, linear manufacturing supply chains into dynamic, interconnected systems—a digital supply network (DSN)—that can more readily incorporate ecosystem partners. As key enablers of DSNs, IIoT technologies help to change the way that products are made and delivered, making factories more efficient, ensuring better safety for human operators, and, in some cases, saving companies a lot of money.</p><h2><strong>The “Where are my car keys?” application of IIoT.</strong></h2><p class="">Another huge benefit of the IIoT is location tracking—the industrial version of a connected fob that makes your keys impossible to lose. Workers can spend a lot of time locating tools, equipment, and finished goods inventory, but the IIoT reduces that time significantly.</p><p class="">“When equipment is built, it goes onto a massive inventory lot that could be three quarters of a mile on each side,” says Schmid. Simply finding equipment on the lot is so time consuming that one of Schmid’s clients saved $3 million per year on each of its production lines once the company’s equipment was outfitted with location-tracking sensors.</p><p class="">Dr. Richard Soley, executive director for the Industrial Internet Consortium (IIC), which works to test and promote the IIoT, has come across similar findings with his clients. Dr. Soley’s group works primarily through “testbeds”—experimental technology implementations designed to measure how well the technologies really work. One of the IIC’s testbeds involved a client with a massive number of tools that kept getting misplaced.</p><p class="">“The client found that its workers spent 47 percent of their time just looking for the right tools,” Dr. Soley says. “But with an IIoT solution, the worker could be told that the tool they needed was 10 meters behind them and to the left.”</p><p class="">This also meant that the workers didn’t have to spend time putting the tool back where it belonged. Thanks to the sensors, the system will always know where the tool is and will tell workers where to find it.</p><p class="">Safeguarding the communication and data transferred between these devices is imperative to their efficiency and keeping the IT Network of any company implementing such tools safe. </p><h3><strong>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got It’s IoT covered? Don’t put it off. Contact Logz.ly today. </strong></h3>





  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Contact Logz.ly today
  </a>

&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598523023215-BX4456VSJK5X477JRA14/LOGZ.LY-FACTORY.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="789"><media:title type="plain">The Industrial Internet of Things</media:title></media:content></item><item><title>IoT and Real Estate</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 09:57:17 +0000</pubDate><link>https://inca.ie/blog-page/iot-and-real-estate</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f4782fbb888042519157733</guid><description><![CDATA[&nbsp;<p class="">When Hurricane Sandy struck the East Coast of the United States in 2012, it left a path of destruction affecting 24 states and causing more than $71 billion in damage. The storm did some of its worst damage in New Jersey and New York, where flooding in New York City’s </p><p class="">streets and subway tunnel lines knocked out power in and around the city for days.</p><p class="">SIlverstein, a property developer whose projects were hit harder than most, used the disaster as an opportunity to hit the reset button.</p><p class="">Silverstein deployed a mobile application that allows tenants to place and monitor work orders and requests, in addition to tracking the exact location of a shuttle bus specific to their residential buildings. It also serves an emergency-alert system, giving Silverstein a direct line of communication, via text messages, emails and automated voice calls, with tenants, residents, vendors and partners in the event of another catastrophic event. Perhaps its most innovative and comprehensive solution, Silverstein has created a centralized monitoring system for many of its buildings, including 4 World Trade Center. “We’re on the forefront of secure, safe, and effective IoT innovation in real estate,” said Bill Dacunto, executive vice president at Silverstein Properties. Building management systems are much smarter, with every device networked to provide continual feedback. “When building managers get information in real time they can immediately address whatever needs to be fixed,” he added. By analyzing utility usage and incorporating efficient energy cells during peak hours to supplement supply, Silverstein has also been able to reduce energy costs for its buildings. </p><h3><strong>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got It’s IoT covered? Don’t put it off. Contact Logz.ly today. </strong></h3>





  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element" target="_blank"
  >
    Contact Logz.ly today
  </a>

&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598522208192-5FG4GXGK6E14RGY4R9O8/Crane.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="789"><media:title type="plain">IoT and Real Estate</media:title></media:content></item><item><title>IoT Monitoring and Logistics</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 09:53:13 +0000</pubDate><link>https://inca.ie/blog-page/iot-monitoring-and-logistics</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f47818289f20f2bf47c920d</guid><description><![CDATA[&nbsp;<p class="">German auto manufacturer Daimler has a vision for a transportation industry where no one dies in a crash, and is utilizing IoT innovation to make vehicles — and by extension, the roads they travel on — safer and more efficient. Daimler, which has maintained a consistent presence as one of the leading adopters of IoT technologies in its vehicles, is continuing to build on past innovations by developing a system for its trucks that allows highly assisted or driverless operations, reducing driver fatigue and increasing road safety. In its pursuit of safer roads, Daimler has already implemented technologies such as proximity control, stop-and-go assist, emergency brake assist, lane-keeping assist and 3-D maps. Such features allow a vehicle to automatically keep a safe distance from other vehicles in a wide variety of traffic and road conditions, in addition to automatically braking if the need arises. Daimler also has integrated improvements to its roadmonitoring systems with innovations, such as a stereo camera and radar sensors, which allow for greater accuracy and improved response times. Daimler is now working to produce a commercially available vehicle equipped with a “Highway Pilot System” that will increase road safety by relieving the driver during potentially dangerous sections of his or her route. In fact, a recent Daimler study found that highly automated driving has a positive effect on driver fitness. Daimler found that assistance from onboard technology reduced driver sleepiness by 25 percent compared with driving a conventional truck, if the driver had the possibility of engaging in other activities while the automated system pilots the vehicle. The benefits of the system aren’t just limited to improved safety. Highly automated trucks will improve fuel efficiency by communicating with infrastructure and other road users, reducing traffic flow and improving fuel economy. “Highly automated driving has numerous advantages: more safety, more efficiency, more ecological sustainability, and more relaxed driving and comfort,” said a Daimler spokesperson. “As an innovative leader in the automotive industry, Daimler Trucks is defining new standards for future transportation needs and leading the wave of innovation toward highly automated trucks and safer highways the world over.” Not just content with a historical position of leadership, Daimler is diving headfirst into the technologies that are rapidly changing the way we live and move. By embracing the potential offered by IoT technologies and focusing on using those innovations to benefit its customers, the roads they drive on, and the other drivers on those roads, Daimler is setting an example of the transformative power of the IoT revolution, an example from which companies in every industry could learn.</p>


&nbsp;<h3><strong>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got Its IoT covered? Don’t put it off. Contact Logz.ly today.</strong></h3>





  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element" target="_blank"
  >
    Contact Logz.ly Today
  </a>

&nbsp;&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598522276693-NLZ87EOQCP2GRQ6CVLUD/Logz.ly-Blog.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="789"><media:title type="plain">IoT Monitoring and Logistics</media:title></media:content></item><item><title>Is IoT Monitoring for business an after thought?</title><dc:creator>Ed Campbell</dc:creator><pubDate>Thu, 27 Aug 2020 09:31:36 +0000</pubDate><link>https://inca.ie/blog-page/is-iot-monitoring-for-business-an-after-thought</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f477bec89f20f2bf47c1ada</guid><description><![CDATA[&nbsp;<p class="">Businesses with big operations all over the world are catching the IIoT wave. What’s not to love? Connecting various devices to the internet so that the devices themselves can actually communicate with teams and sometimes with each other to make automated adjustments, alert teams about problems or points of interest, and, over all improve the efficiency of operations. The variety of IoT applications has is huge and is only getting bigger. The  variety of applications of IoT to optimise operations for business is beginning to look as though it will grow exponentially over the next 5 years. The uses are endless. Farmers are beginning to use IoT to monitor the PH levels of soil, altering them automatically in order to yeild a larger crop. Large apartment blocks use IoT sensors to control lighting and heating systems only when needed  which means energy expenses are kept as low as possible. Large construction projects are beginning to use IoT sensors to locate tools meaning construction crews don’t have to spend much time locating tools, or returning them to any specific location. </p><p class="">In order to take advantages of these efficiencies, these devices have to be connected to the internet. This poses a risk in itself, but the problem grows in stature when we estimate how many devices an operation might have to connect to the internet in order to have a positive effect on its output efficiency. Take the construction site for instance. How many tools might be needed on a large construction project lasting 2+ years?  Thousands, perhaps even hundreds of thousands if the operation was particularly large. Hundreds of thousands of devices connected to the internet. </p><p class="">Each of these tools would now represent a vulnerability, or a relatively easy gateway to your company’s network. Not only that, but a potential bad actor could just target the tools themselves, potentially ruining the efficiency strategy, forcing a company to pour resources into re-organising the tools in a non IoT fashion. This could have a huge impact on schedules, timelines and deadlines. Management might even be in a position where they’d agree to pay a ransom, rather than go without their Iot-tool strategy. </p><p class="">It seems that we’ve grasped fully the positive that IoT in industry has to offer, but we haven’t really examined what might be the negative, or the security cost of IoT.  Perhaps this is because, incidence of IoT hacking resulting in a large-scale corporate catastrophe isn’t common place enough for us to consider it a likely threat. IoT security is an afterthought. Something to sort out once the IoT strategy is up and running! </p><p class="">In real terms, the threats we face with IoT will be just as clever as it’s application and perhaps far more complex. </p>


&nbsp;&nbsp;<h3><strong>Thanks For Reading.. </strong></h3><p class=""><strong>Logz.ly is an INCA Networks Log Management and IoT monitoring solution.</strong></p><h3><strong>Has your company got Its IoT covered? Don’t put it off. Contact Logz.ly today. </strong></h3>


&nbsp;


  <a href="https://logz.ly/contact-logzly" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element" target="_blank"
  >
    Contact Logz.ly today
  </a>]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598521256898-5IM78X54O1R4S445M1QJ/san-fran-ly-again.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Is IoT Monitoring for business an after thought?</media:title></media:content></item><item><title>Top Seven Security Tips For Working from Home - Top Tip #3</title><dc:creator>Ed Campbell</dc:creator><pubDate>Wed, 26 Aug 2020 16:57:08 +0000</pubDate><link>https://inca.ie/blog-page/top-seven-security-tips-for-working-from-home-top-tip-3</link><guid isPermaLink="false">5cb19d910cf57d6a4d9913ef:5f1f030b2b5c91089b6de828:5f4686548f89514f2a1163fe</guid><description><![CDATA[&nbsp;<h3>Use two-factor authentication.</h3><p class=""><br>Breaking it down to the most simple&nbsp;explanation, two factor authentication basically means adding a second layer of protection to your account, app or service to go alongside your regular method of logging in. In most instances, this involves receiving a code by SMS to your mobile number, but increasingly apps and services are sending a confirmation number to your device as a notification instead. Sometimes you can just tap the notification to approve the login.</p><h3>How does two-factor authentication make your account more secure?</h3><p class="">The idea is that you're adding a confirmatory step to your sign in attempt. Using the SMS example,&nbsp;it means no one can log into the account in question from a new device, even if they have your password.</p><p class="">When someone tries to log into your account from a new device, or even new browser, with your password, when they hit "enter" or "submit", it'll take them to a new screen asking for a code. This code has been sent to the registered mobile number as an SMS.&nbsp;</p><p class="">Some apps that use notifications also send you a code. But increasingly, apps are just sending a notification to your key devices so you can just confirm it was you signing in (in their words, there's no code). </p><h3>Is it necessary?</h3><p class="">Yes. In the modern world, it’s safer to assume that your network is not only being monitored by your IT Team, but it’s also being monitored by bad actors, searching and waiting for an opportunity to present itself to breach your network. Utilising authenticator apps can negate some threats entirely, and while they can be a little tricky to set up, it’s more than worth it to keep your network secure. </p><p data-rte-preserve-empty="true" class=""></p><h3><strong>Thanks for reading.. </strong></h3><h3><strong>INCA Networks is a Cyber Security company in Co.Dublin with over 20 years experience in keeping business networks secure.</strong></h3><h3><strong>If you’re considering Managed IT Security for your firm’s network, take a look at our Managed IT Security page. </strong></h3>





  <a href="https://inca.ie/managed-it-services" class="sqs-block-button-element--small sqs-button-element--tertiary sqs-block-button-element"
    
  >
    Managed IT Security
  </a>

<meta name="twitter:card" content="summary_large_image">
<meta name="”twitter:site”" content="”@IncaNetworks”" />
<meta name="”twitter:title”" Networks” content="”INCA" />
<meta Company Ireland.” name="”twitter:description”" Security content="”IT" />
<meta name="”twitter:image”" content="”https://images.app.goo.gl/6pyTcNjcnRLTuKm97”" />&nbsp;]]></description><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/5cb19d910cf57d6a4d9913ef/1598460196740-FMDBO0C8CPWW2O4LJ9VP/AUTHY-APP-Picture.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="784"><media:title type="plain">Top Seven Security Tips For Working from Home - Top Tip #3</media:title></media:content></item></channel></rss>