Which firewall software do you use? Compatibility issues? not with us!

Have you had software compatibility issues causing you to upgrade or purchase something different in order to use a particular hardware.Well with Pondesk systems you won’t encounter those issues because we understand the difficulty with many systems on the market and believe that a client shouldn’t have to change their firewall choice to use a certain hardware

MNHO-048-7

Some of the popular firewalls currently on the market are open source firewalls like pfsense. This is a piece of software which like any other firewall stands as a gateway to allow or to discard information through its walls depending on the rules set by the owner. . At the simplest form of it, a perimeter security device provides protection for trusted devices (internal devices) against entrusted devices (external devices such as those on the Internet.

The base software supports a lot of features including:

  • Static/default/dynamic routing
  • Network Address Translation (NAT)
  • Virtual Private Networks (VPN)
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)
  • Load balancing and so on

(We install free version of firewalls as per customer request, for licensing please contact the vender)

Our most popular models that support all the above are:

We don’t compromise with our quality whether you have a commercial firewall or its open source, we still provide the same high-end systems making it easier and also cost-effective for you and your business. On the other hand all our systems are compatible with Windows and Linux

For more details and pricing on any of the models above please do visit the website and for wholesale enquiries email us at info@pondesk.com

Beginners Guide To What Is A Cyber Attack & Its Outcome…

How many times have you heard about cyber attacks and how hackers can just access your system compromising all your important files, data and even demanding money. But what really is a cyber attack and what does it really mean to the next generation?. As technology grows and our lives get more dependent on IOT (Internet of things) we really need to know what we are up against and what can be done to prevent future attacks effecting millions of businesses and consumers.

So let’s get started….

A cyber attack which is also known as a CNA is a little tiny creature/s that uses malicious code to mutate computer code, logic or data, creating havoc that compromises data leading to cyber crime and things such as identity theft and information.

Below are just a few more examples of how far this little creature can really go:

  • Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
  • Denial-of-service and distributed denial-of-service attacks
  • Breach of access
  • Password sniffing
  • System infiltration
  • Website defacement
  • Instant messaging abuse
  • Intellectual property (IP) theft or unauthorized access

Many of these attacks can be targeted to the government,businesses or individuals. they don’t necessarily have to be on a large-scale or wide-ranging. Now that you know what is a cyber attack, you might be thinking but why do cyber attacks happen?. Well in simple terms cyber attackers are either criminally or politically motivated whereas some are just doing it for a laugh, trying to really live to the motto of ‘YOLO’.

‘A recent incident which happened earlier this year is known as one of the biggest ransomware incidents in history. This is an extreme example of what and how far one piece of software can do to thousands of people and businesses. Known as WannaCry which has believed to be developed by the US National Security Agency confined the NHS, hit international shipper FedEx and infected computers in 150 countries. More than 300,000 computers were infected.

This type of ransomware is often delivered via emails which trick the recipient into opening attachments and releasing malware onto their system in a technique known as phishing. hmmm now how many of you get weird emails that look tempting to open?… DON’T DO IT!

Once your computer has been affected, it locks up the files and encrypts them in a way that you cannot access them anymore. It then demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

So overall if cyber attackers can go this far to really gain access to cause harm and distress to so many people, I think we really need to take a drastic step and put in changes to stop a repeat or even any sort of cyber attack in the future. So make sure we start with the basics of changing passwords regularly, not having the same password on multiple platforms and updating windows making sure there can’t be any gaps for destruction.