WB01342_.gif (412 bytes) Home
WB01342_.gif (412 bytes) LAN/WAN
WB01342_.gif (412 bytes) VPN's
WB01342_.gif (412 bytes) Security
WB01342_.gif (412 bytes) Systems
WB01342_.gif (412 bytes) Project
WB01342_.gif (412 bytes) VoIP
WB01342_.gif (412 bytes) Contact Us
WB01342_.gif (412 bytes) email

ImageMak.gif (1615 bytes) Telecoms & IT Consultancy


There is built in security where traditionally a companies network has evolved using leased lines and  
proprietary protocols. It is not easy for a potential hacker to get at the data. Today TCP/IP is
implemented in the vast majority of organisations, deploying open systems and common standards. This
has great advantages but with it comes additional security risks.
An organisation needs to decide where it positions itself between the two extremes of total security and total access. A policy needs to articulate this, and then define how that will be enforced with the correct practices. This policy where appropriate should include control of back- up information and a disaster recovery plan.       sec3.gif (8280 bytes)
To protect your company information there are many things to consider. How does an attacker gain 
access to your equipment? Is physical access an issue? What are your connections to the outside world?
Is there Internet access? Are there dial-up connections?
Security violations generally fall into one of the following categories:-  
• Wire tapping, gains access to data and passwords
• Impersonation, allows unauthorised access to emails or other documents
• IP Spoofing, allows access to networks that rely on IP address filtering
• Denial of Service attacks, renders network non-functional
• Guessing of passwords, using e.g. dictionary attacks
• Guessing keys, gets access to encrypted data
• Viruses, allows the attacker to destroy data and disrupt system operation
It is important to have in place security measures that will minimise or prevent exposure to these types of 
attacks especially in today’s environment where e-commerce and wireless LANs are playing a greater
role in the way business is conducted.
Makom will take the time to understand your organisation’s security policy, and can design and build a 
security architecture that best implements that policy. Other issues like services required, convenience,
and scalability will factor in to the final design. We will advise on what technologies to apply and where,
including, Firewalls, IP filtering, proxy servers, content checking, certificate administration, SOCKS,