Emerging unknown Threats!!!

Do you know that every computer chip made in the last 20 years is vulnerable to cyber-attacks? Exploring microchip can lead to gaining access to your privet data which was considered fully protected before researchers discovered in 2017 and official announcement follow through in 2018. Spectre and Meltdown are names given to the specific variant of flaws.

Spectre and Meltdown can harm not only personal computers but mobile devices and cloud storage devices as well. There is a good possibility of stealing data from all the above devices. Stealing data could be of passwords, personal photos, email and highly sensitive documents related to your business.

Meltdown attacks the system memory and steals the secrets whereas Spectre breaks the isolation between different applications.


One of the findings came out of the research suggest that vulnerability develops from features but into microchip which allows the programme to run fast which can have an impact on system functionality researchers clearly mentioning that such flaws are very difficult to detect early and once developed such situation is referred to as “catastrophic”.


PONDESK is there to help you secure your data and have devices such as  MNHO-028 MNHO-048, NSHO-043, NSHO-073 etc which are Meltdown and Spectre Protected!! These devices can include two USB2.0 & USB 3.0 ports and VGA & HDMI dual display ports features Intel® HD Graphics. These devices are compatible with Windows 7/8/10, Windows Server, Linux & Firewalls etc.

They support up to 8GB SODIMM DDR3L 1.35V low voltage non-ECC single-sided memory and dual storage drives including mSATA SSD and 2.5″ SATA SSD/HDD. Highly reliable universal performance and 10W (idle) low power consumption helps user getting much better computing experience.

High performance & perfect for VPN, DNS Server, DHCP Server, network bandwidth controller, network servers, LAN or WAN router, firewall and UTM applications to deliver a high throughput

The importance of Network Security Firewalls


The ability to protect systems increases the demand for advanced security services is necessary with the ability to assess the risk of cyber-attacks. The breaches of cybersecurity may need to adopt new methods to prevent any intrusions.With the increasing number demand for advanced security to protect networks against any attacks the ability to have a great firewall is necessary



This stems from the growing web applications that may be linked to the server and the confidential data that is also stored on the server the point to access needs to be secured for any intruders trying to penetrate the network and gain access to this data. the adoption of network security firewalls for cloud technology is also fuelling the growth of network security firewalls market.

The SME, Charities and other organisations must protect their access point even regarding connection with IoT device that does lack security in their design. That is the reason network security firewalls are needed to protect the internet and the internal network to protect organisations from suffering serious consequences with data and information. The network can be secured with the help of a firewall securing data pathway preventing unauthorised access.

The many privileges of security management services are primarily to protect data and secure the perimeter with many devices added to the network and many potential exposures creating better solutions for businesses.

Networking Security Firewalls can be segmented with many being proficient in cloud computing, on-premise, signal firewalls and SMS firewalls. The necessary use of these firewalls indicated the ability to serve and protect our networks

5 steps to Securing Your IoT Devices


The issue is that the lack of security within the IoT realm is an issue and everyone knows these problems are down to poorly secured IoT devices.  The ability to enter an access point will leave users in a vulnerable state regardless whether they protect themselves against cyber crimes they will fall victim to pray.  The need for users to secure the perimeter of their security base in accordance to protecting themselves is important and ,anyone poses a cyber threat.  These steps provide you with a chance to secure your IoT device.

Step 1- avoid connection to your devices directly to the internet rather be safe and use a firewall. There are key issues with this when users choose to keep their firewall in front. The issue is most IoT products are not designed to have security in mind and these device over a public internet base could cause users vulnerable attack and cause issues that may be detrimental to your network gaining access to personal information keep your IoT devices behind the firewall as best you can


Step 2- Use complex password that will leave you in a secure position this is very important to create something that is not memorable. Keep these passwords secure and in a safe place always.

Step 3- Updated your firmware make sure that the hardware is updated often, and your security updates are frequent. In regards, to your firewall make sure your firmware is updated contact your O/S for any updates.

Step-4 The issue for IoT devices is Peer to Peer (P2P) capability either installs on their device or maybe build in this aspect will be problematic for your security and research shown that they can be reachable even through a firewall remotely over the Internet because they’re configured to continuously find ways to connect to a global, shared network so that people can access them remotely in the long term please bare this in mind and find solutions that can combat this problem and issues.


Step 5- The cost of IoT device various but depend on the purpose may vary but, one thing take note of the cheaper product might not be better and the correlation between price and security, has shown that devices that tend to be towards lower range are most likely to be the most accessible to cyber criminals and some device might have malicious ware already contained on the device. The vendors for these affordable devices might lack on the support and updates for firmware of these devices.


The conclusion to this article shell demonstrate the various steps to protect yourself whatever device you use in the Internet of Things.


Why are changes being made to combat cyber-security?


With cybercrime being a very common problem these days in a network aspect the elasticity of protecting your networks personal details are vital and persons attached to that network can be very vulnerable to any crime. The ability for any criminal to penetrate the network and gain access to data is very likely when there is no firewall and security encryption. The firewall serves as a protective system that the intermediate between the computers network and the internet. The firewall serves the purpose of analysing data entering and exiting the network based on the configurations made for the network. The choices between firewalls that are hardware and software is important, but the ideal firewall should consist of both. The firewall provides also a secured private network through secure authentication.


The purpose of our hardware firewall is to serve the purpose for our customers as a multifunctional device with the ability to become customizable and bespoke. The benefit of having a hardware device is there is little, or no configuration needed, and they can protect every machine within the network. Our device has a minimum of four network ports to connect to other computers and we have different firewall solutions for larger networks and business available. As mentioned before there is a little, or no configuration needed and adjusting a few settings will have it working. The flexibility to have hardware firewall will allow consumers the ability to do very little configurations to enable them. The device serving the capacity to protect networks from any cybersecurity issue. One thing for consumers to bare in mind when purchasing a firewall device, the ability to have advancement encryption standard in any firewalls they purchase is a necessity this technology allows the encryption of data.

The issue with just software based firewalls is the efficiency to sustain a network where the hardware solution is a safer option. Hardware firewalls are directly behind a router, the security of every single packet being passed through your firewall before landing within your internal drives. Our firewalls focus on “intelligent’ functions which analysing the dataset is important this will prevent any cyberattacks and monitor for any irregular activities that can cause malicious attacks on your network.The ability to have a hardware firewall running for days will provide instant protection for your network. Any of our hardware firewall can be compatible with both Windows and Linux etc.  The hardware can also be configured as a firewall either open-source or commercial software for example; pfSense, Sophos, Untangle, Ubuntu, ClearOS, FreeBSD, Monowall, Debian, Endian, Smothwall UTM, OpenBSD, Zeroshell, Zentyal, OpenWRT and VyOS etc.







The Internet of Things (IoT) PICO PC® E3845.


MNHO-073-798The flexibility is endless when identifying the dynamic capabilities of the  When, linked to The Internet of Things (IoT) will create a driving industrial revolution the capabilities to serve in multiple industries from energy grids, logistics and supply chain management has an importance in these industries and intelligent devices such as PICO PC® E3845 are centre pieces to accessing their data reducing their time to market, and innovate connected technologies that are very efficient and that are also fast. In addition, the ability to IoT solutions are required in maximum performance with robust capabilities that will be expanding over the next coming years this will meet the demands for operating. PICO PC® E3845 is a new segment for and accelerates IoT innovation across a wide range of demanding environments and use cases.

The PICO PC® E3845 Is powered by an Intel Atom® processor E3845 Processor high performance per watt, low thermal design power (TDP) of 10W and running quad cores customers can scale performance with the ability to achieve workload consolidation in a situation and with the aluminium case assists with the device using low power, high-density and fanless designs and high I/O integration. The this SoC-based CPU is manufactured on Intel’s optimized 14nm process technology, the quad core processor allows the device to run at 1.9.1GHz and includes up to 8GB and IoT applications assists with many applications for automation and control providers with using WiFi, 3G/4G LTE via mini PCIe allows the ability for flexibility. The integration of Its four integrated Ethernet controllers enable the next level of bandwidth-intensive industrial implementations. Plus, up to configurable high-speed input/ output (HSIO)—including the support of SATA connectivity and USB 3.0 and USB 2.0. The PICO PC® E3845 allow greater customization, including dedicated functional safety channels and support for next-generation storage expandability.


The PICO PC® E3845 Intel Atom Processor delivers up to 2.3x with better and the capability to Intel® AES-NI and RJ45 COM for secure and fast data encryption and decryption performance than the previous generation. its low TDP 10 w power use cases and fanless designs. In addition, support for industrial ambient operation temperature enables effective operation in temperatures ranging from -40°C up to +110°C. Server-grade safeguards which is a dynamic capability to operate in different environments allowing capability for The PICO PC® E3845 to operate.

The PICO PC® E3845 to have a flexible capability with versatility solutions for IoT innovation, scale industrial process and the energy applications, provides customers with the efficiency to expand on their capabilities to serve multipurpose and expand IoT technologies into a broad range of high-density, low-power, and high-I/O use cases

The PICO PC® E3845 is combination of many attributes for a perfect networking device with integrated technologies, energy proficiencies applications and firewall applications. The PICO PC® E3845 It provides a robust and flexible platform to scale the platform is built to protect today’s IoT investments and keep delivering value into the future.


Which firewall software do you use? Compatibility issues? not with us!

Have you had software compatibility issues causing you to upgrade or purchase something different in order to use a particular hardware.Well with Pondesk systems you won’t encounter those issues because we understand the difficulty with many systems on the market and believe that a client shouldn’t have to change their firewall choice to use a certain hardware


Some of the popular firewalls currently on the market are open source firewalls like pfsense. This is a piece of software which like any other firewall stands as a gateway to allow or to discard information through its walls depending on the rules set by the owner. . At the simplest form of it, a perimeter security device provides protection for trusted devices (internal devices) against entrusted devices (external devices such as those on the Internet.

The base software supports a lot of features including:

  • Static/default/dynamic routing
  • Network Address Translation (NAT)
  • Virtual Private Networks (VPN)
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)
  • Load balancing and so on

(We install free version of firewalls as per customer request, for licensing please contact the vender)

Our most popular models that support all the above are:

We don’t compromise with our quality whether you have a commercial firewall or its open source, we still provide the same high-end systems making it easier and also cost-effective for you and your business. On the other hand all our systems are compatible with Windows and Linux

For more details and pricing on any of the models above please do visit the website and for wholesale enquiries email us at info@pondesk.com

Beginners Guide To What Is A Cyber Attack & Its Outcome…

How many times have you heard about cyber attacks and how hackers can just access your system compromising all your important files, data and even demanding money. But what really is a cyber attack and what does it really mean to the next generation?. As technology grows and our lives get more dependent on IOT (Internet of things) we really need to know what we are up against and what can be done to prevent future attacks effecting millions of businesses and consumers.

So let’s get started….

A cyber attack which is also known as a CNA is a little tiny creature/s that uses malicious code to mutate computer code, logic or data, creating havoc that compromises data leading to cyber crime and things such as identity theft and information.

Below are just a few more examples of how far this little creature can really go:

  • Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
  • Denial-of-service and distributed denial-of-service attacks
  • Breach of access
  • Password sniffing
  • System infiltration
  • Website defacement
  • Instant messaging abuse
  • Intellectual property (IP) theft or unauthorized access

Many of these attacks can be targeted to the government,businesses or individuals. they don’t necessarily have to be on a large-scale or wide-ranging. Now that you know what is a cyber attack, you might be thinking but why do cyber attacks happen?. Well in simple terms cyber attackers are either criminally or politically motivated whereas some are just doing it for a laugh, trying to really live to the motto of ‘YOLO’.

‘A recent incident which happened earlier this year is known as one of the biggest ransomware incidents in history. This is an extreme example of what and how far one piece of software can do to thousands of people and businesses. Known as WannaCry which has believed to be developed by the US National Security Agency confined the NHS, hit international shipper FedEx and infected computers in 150 countries. More than 300,000 computers were infected.

This type of ransomware is often delivered via emails which trick the recipient into opening attachments and releasing malware onto their system in a technique known as phishing. hmmm now how many of you get weird emails that look tempting to open?… DON’T DO IT!

Once your computer has been affected, it locks up the files and encrypts them in a way that you cannot access them anymore. It then demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

So overall if cyber attackers can go this far to really gain access to cause harm and distress to so many people, I think we really need to take a drastic step and put in changes to stop a repeat or even any sort of cyber attack in the future. So make sure we start with the basics of changing passwords regularly, not having the same password on multiple platforms and updating windows making sure there can’t be any gaps for destruction.