Author Archives: iqnetservices

Good Business Charter

We are very proud to have recently been accredited by the Good Business Charter.

What is the Good Business Charter?

The GBC is a not-for-profit organisation that encourages businesses of all sizes to behave in a responsible way to their customers, suppliers, and other organisations. You can find out more about their 10 point charter and information about how your business can join in and become accredited on their website. Even if a business doesn’t want to become accredited there are only good reasons to follow their 10 point charter and improve your business practises, show you care, be ethical, and improve their public image!

Put more in, get more out, and become an Ethical Capitalist.

Cybersecurity

With the increasing volume of data, devices, programs, and users in the modern enterprise, implementing effective cybersecurity measures can be challenging.
Attackers will keep finding new and creative ways to break even the most sophisticated of barriers. Understanding cybersecurity to help identify the best practices to prevent unauthorised access to networks and data has never been more crucial.

Cybersecurity
Cybersecurity is known as electronic information security or information technology security. It is a body of practices, processes, and technologies designed to defend electronic systems, mobile devices, data, servers, and networks from malicious attacks or unauthorised access.
Cyberattacks are usually orchestrated to access, change, or destroy confidential or sensitive information and in some cases to interrupt regular business processes for reasons or sabotage or extortion.

Types Of Cybersecurity
The term cybersecurity can be used in different contexts from mobile computing to business, and can be divided into several different focuses.
Network Security: This is when a computer network is secured from opportunistic malware or targeted attackers.
Application Security: For software to be kept safe and free of threats, its security has to be designed concisely to prevent its data from being compromised.
Information Security: The privacy of data in transit and storage are protected with information security.
Operational security: This deals with user permission and access including the decisions and processes involved when handling data assets.
Disaster Recovery And Business Continuity: An organisation’s response to cyber-security incidents or any other event that causes the loss of data falls under this umbrella. In the absence of certain resources, fall-back options need to be put in place for operations to continue.
End-user Education: Humans are liable to make mistakes and in business a small mistake can lead to the introduction of a virus, so good security practices and policies must be followed to ensure a secure system.

Why Cybersecurity is even more important with the evolution of new technologies

IoT And 5G
Our society is become more dependent on technology and this trend increases on a daily basis. The introduction of new technologies such as IoT and 5G networks creates more room for vulnerability due to the expanded and faster nature of their networks.
An increase in the number of connected devices can bring about numerous multidimensional cyberattacks. Therefore, a well-defined and regularly updated cyber strategy is vital.

Greater Use Of Cloud Computing
A market study by Canalys in 2019 revealed how cybersecurity deployment had a 46 percent year-on-year increase. This shows that organisations and businesses believe in cybersecurity solutions for public cloud as a service.
Cloud computing services are increasingly being deployed, but hackers are also increasing their knowledge with the use of machine learning and artificial intelligence to carry out their cyberattacks. This reinforces the need for cybersecurity to prevent and avoid automated cyberattacks.

Threats to Cybersecurity
Nowadays, there is a concern for the need to shield information from malicious parties even at the highest levels of business. The sophistication of cyber attackers and their growing volume pose a serious danger.
Organisations that have a sole dependency on customer’s data can have their databases breached. In 2017, credit reporting company Equifax had its database compromised and 147.9 million people’s personal information stolen (more than twice the population of the UK).

Types Of Cybersecurity Threat
Here are types of threats that are not only present today but will continue in the future.
Malware
Malware is one of the most popular cyber threats. It is a type of malicious software used by cybercriminals to damage or harm a user’s computer. They are often spread through legitimate-looking downloads and unsolicited email attachment. Types of malware include:
Trojans are disguised as legitimate software on user’s computers and are used to collect data.
Spyware programs are used to secretly record what a user does. They could be used to capture credit card or cloud login details for example.
Ransomware works just like blackmail. A user’s files or data are encrypted, and will only be decrypted when a ransom is paid.

Phishing
Phishing is a generic email or messaging attack that is performed on a large scale, where the same message is sent to many unconnected mailboxes and the distribution is large. Commonly a phishing attach will try to take the user to a fake site where the user may be tricked in to entering sensitive data like credit card numbers or supply real login details for a service.
Spear Phishing attacks are more targeted and can come across as legitimate email or text messages from a colleague or business partner. Cybercriminals target victims in a refined form of social engineering by supply some real and familiar details, causing the user to lower their guard and think they are communicating with someone they know.

Insider Threats
Insider threats can be negligent or malicious. Caused mostly by humans, they involve losses or security breaches by customers, contractors, or employees.

Social Engineering
This usually involves breaking security procedures by relying on human interaction in a bid to gain sensitive information. Cybercriminals employ different tricks to carry out this type of attack.

Distributed Denial-of-service (DDoS)
Attacks are directed at a website, server, or other network resources with a flood of connection requests, messages, or packets. The attackers make use of multiple systems to disrupt the traffic of the targeted system thereby overloading or slowing down the system.

Advanced Persistent Threats (APTs)
This is where the infiltration method is used to manipulate a server in a prolonged targeted attack with the aim of stealing data and staying undetected.

Man-in-the-middle (MitM)
Messages between two parties are intercepted by an attacker and the information stolen without the two parties’ knowledge.

Other
There are other popular attacks such as vishing, credential stuffing attacks, drive-by-download attacks, botnets, malvertising, exploit kits, zero-day exploits, SQL injection attacks, and business email compromise (BEC).

Cybersecurity Tips

  • Keep systems updated with the latest security patches
  • Employ the services of reliable and trusted antivirus software and security solutions for a better level of protection
  • Ensure your passwords are strong and difficult to guess
  • Beware of opening unknown email attachments or links that could be infected with malware
  • Avoid unsecured networks, like public WiFi, as these can be used to execute man-in-the-middle attacks.

Conclusion
Cybersecurity is the hope for the future of technology. Not only are the number of attacks growing, but they are also becoming harder to prevent.
Cyber vigilance is an important attribute in the cybersecurity setting. Educating your organisation about popular attacks such as typosquatting, phishing emails, and other social engineering scams is also very important.
To thwart any serious cyberattack, a multi-layered cybersecurity approach involving a standard combination of software and firewalls is recommended.

Internet of Things

Since its inception in 1999 IoT has gone from an idea to an industry approaching a trillion US dollars, simply due to its firm assertion in our daily lives and the objects we use and see around us.
What exactly made the Internet of Things what it is today? This and many more questions together with its influence in the modern world are what we’ll be looking to address in this article.

What is IoT?
The Internet of Things (IoT) refers to a network of internet-connected objects or things that have software, detectors, and other technological sensors built in to connect and exchange data from other systems and devices without human intervention.
Data is received and sent out from different sources to these products with the cloud playing a significant role in the whole IoT environment. To put it plainly, once an object has an identifier, an IP address, and an internet connection it is an IoT-enabled solution.
IoT also connects services, animals, and people to the internet. It is not limited to physical objects like sophisticated industrial tools or ordinary household items.
The Internet of Things is the internet-able nature of modern physical devices, vehicles, and buildings. IoT products are also referred to as connected devices or smart devices.

IoT’s Meteoric Rise
The devices being connected have been around since the 70s and it was often called “pervasive computing” or “embedded internet” in the 70s and 80s. It wasn’t until 1999 that Kevin Ashton coined the term “Internet of Things” during his work at Procter & Gamble.
Even then, its popularity didn’t progress till 2010/2011 and finally attained mass-market awareness when Google announced it would buy Nest for $3.2 billion in January 2014. Coincidentally, the Consumer Electronics Show (CES) 2014 featuring over 152,000 participants, 3,200 exhibitors from more than 150 countries was held in Las Vegas under the theme of IoT in the same year.
Despite the ongoing COVID-19 pandemic the market for IoT grew in 2020 whilst the global GDP declined by 5%. Today, there are over 20 billion active connected devices worldwide, and the number is expected to exceed 30 billion by 2025. It is expected that by 2025 there would be almost 4 IoT devices per person across the planet, which paints an optimistic picture for IoT technology going into the future.

The Benefits Of IoT
Data Collection
IoT can help businesses and other organisations improve their products and services by using advanced analytics on collected data to provide important insights into consumer behaviour and predict future trends. How customers request a service and the supplier’s typical response can be monitored. Leveraging this type of information could increase revenue, reduce operational costs, and create new growth opportunities.
For example, delivery services can calculate which delivery area has the highest traffic (and at which times) with the use of GPS tracking devices. This can help when allocating resource to different areas during the course of the working day. Different types of data can be used build targeted marketing campaigns, sales drives, or identify new business opportunities.

Increase Customer Dialog
IoT provides opportunities to strengthen the degree of interaction and communication with customers. Smartphone based transactions, shipment tracking, and utility bills can help retain customers’ trust and improve the overall experience. Real-time data analytics can also be used to create Frequently Asked Questions to reduce time spent while making purchases or providing customer service.

Improve Monitoring
Smart devices and sensors allow a network of physical objects to be managed. When data is monitored across the numerous layers of infrastructure and various networks used by an organisation, historical data can be fused with new data to create a predictive model for the future. Plans for contingency, redundancy, and failover can also be implemented.
For instance, tracking the vibration or temperature of machine details makes the early detection of a failure possible. Devices connected by the Internet of Things help to communicate this type of data and intervention can been taken quickly avoiding long-term consequences.

Efficiency And Productivity
In a study by Aruba, it was found that 46% of businesses that made use of IoT techniques experienced an increase in efficiency despite only 29% of them expected the gains.
The basis for improved productivity is efficiency. One major way to influence a company’s efficiency is to leverage the power of IoT to cut down on time-consuming and repetitive tasks. IoT can help provide an overview of employee productivity in the work environment, which in turn can be used to promote a more productive approach and to streamline the workflow.

5G And Its Impact On The Internet of Things
5G offers transmission speeds as high as 15 to 20 Gbps. Compared to 4G that offers 12 to 36 for download and 7 Mbps to 17 Mbps for upload, it is the next-generation mobile network. The number of devices that can be connected increases greatly with latency reducing to ten times less. This allows more devices to deliver more data quicker, resulting in more accurate analysis and an almost real-time experience. 5G will be a game changer for IoT.

Increase In The Number Of Connected Devices
This is the most significant of all 5G impacts on IoT. Devices will be connected faster in every area of technology.
Sensors will be deployed in buildings and smart cities as the number of connected devices increase. 5G will allow areas to be saturated with small sensors which will allow uses like turning on street lighting when pedestrian movement is detected.
Bluetooth technology is already being used for tracking. However, 5G will allow a lot more data to be transmitted easily with IoT so that equipment, vehicles, and people will be tracked more efficiently.

Problems Of IoT
In as much as IoT presents a lot of wonderful opportunities for interaction without the environment, there’s also the possibility of these “things” interacting with the Internet without our permission. This can pose serious privacy and security issues.
IoT still has a lot of security challenges to overcome to be close to being safe. However even though the technology hasn’t reached that stage, it promises to get there.

The following are areas in which IoT can improve on;

  • User knowledge and awareness
  • Compliance on the part of IoT manufacturers
  • Data transfer and storage
  • Industrial Espionage and Eavesdropping
  • Physical hardening
  • Protection from botnet attacks

Conclusion
The Internet of things promises to improve every aspect of life from households to businesses with internet-enabled devices. The advent of 5G technology raises the possibilities to another level (which in turn comes with its own baggage in terms of privacy and security issues). IoT is here to stay and the only solution is to find ways to make it safer for everyday use.

Blockchain Explainer

What is Blockchain?
Blockchain is an immutable, shared ledger that facilitates the tracking and the record keeping on a business network. Any asset can be tracked within the Blockchain network; whether the asset is tangible like land, house and cars. The network can also keep track of intangible assets like patents, branding, intellectual properties, copyrights, etc. Virtually anything of value can be tracked using this technology. This makes the underlying assets secure and reduces the overall administrative costs. Blockchain is a transformative technology that has a lot of potential and will end up influencing almost every area of our life; whether it’s finance, logistics or healthcare, this technology can be applied. One of the most profound applications of Blockchain is with cryptocurrencies; basically Blockchain is the ecosystem that supports cryptocurrencies like Bitcoin. This shows how powerful Blockchain can be.

Why is Blockchain important?
Every business highly depends on information; actually businesses are run on information. The faster and more accurate the information can be received, the easier it becomes to do business and make relevant decisions. Blockchain is an ideal technology for this because it provides immediate access to information. The information is shared in a transparent manner and the ledgers can be accessed by any authorised member within the network. The Blockchain network can be used to track payment, orders, accounts, production, distribution and other business operations. Within the network all the members see the same information in a single view, so all the details of the transaction can be seen end-to-end and this brings about greater confidence making operations more efficient.

Key Features of Blockchain
Blockchain is made up of a distributed ledger technology. The ledger is immutable and all the members within a particular network have access of all the information. Since the ledger is shared, information is recorded only once and this eliminates any duplication efforts that can take place on other more traditional business networks. Since it is immutable, no single individual is able to change or tamper with a transaction once it has been recorded into the shared ledger. If a transaction that was added to the network had an error, then a new transaction will have to be added to the network to reverse the error and both transactions will be visible. Smart contracts is another key aspect of the Blockchain technology. Smart contacts are protocols within the network that are intended to automatically execute various actions based on the terms of the contract. Smart contracts have defined conditions and can use to execute a wide range of operations like corporate bond transfers.

Benefits of Blockchain Technology
Traditional record keeping and information management systems have very many drawbacks like wastage of time duplicating records and a constant need for verifications from third parties. These record keeping systems are very vulnerable to cyber-attacks and fraud. Limited transparency often slows down the process of data verification. With the usage of IoT, transaction volumes have drastically increased and this has increased the difficulty of using traditional systems. The extra processing results in slowness and drag, reducing the overall output of a business. Contrary to this Blockchain has set itself apart as the most reliable and secure system when it comes to information management. It is extremely secure and accurate as any new data added into the system will have to be verified by all the members. Verified transactions are also immutable because they are usually recorded permanently and no one within the system can delete the record, not even the administrators. Since the networks can only be accessed by members, you can always rest assured that you are receiving timely and accurate data. In conclusion, Blockchain is a very efficient, secure and reliable technology that can be applied in many areas.

Sorry, Videoconferencing is Here to Stay!

Over the last 15 years videoconferencing has moved from expensive proprietary hardware and ISDN lines to computer/smartphone based applications and the internet, making it not only far cheaper but more accessible to a much larger proportion of the general public.
Zoom is clearly one of the most popular and well recognised videoconferencing platforms in the UK. Over lockdown Zoom Video Communication Incorporated’s share value increased by 735% in a ten month period, and this was directly related to social distancing, travel restrictions, and remote working taking pole position. Zoom has made the move from adverts you would once see on the side of London black taxis to apps installed on our PCs, Macs, and smartphones.
It’s not a closed market however as GoToMeeting, Microsoft Teams, Google Meet, and Cisco Webex are other very popular platforms, and although still popular, Skype Business will reach its end of life in July 2021 because Microsoft will replace it with Teams.

Data and image from Yahoo!Finance

A minority of the public want lockdown (or what they like to call “the new normal”) to remain indefinitely simply because it suits their lifestyles to never return to the office, only shop online from supermarkets and Amazon, and binge on Netflix. However the majority of the public want lockdown lifted, and either want to return to their place of work or have a mix of days in the office and at home during the working week. Whichever way you look at it videoconferencing and remote working is here to stay.

Let’s talk a little about the best time for business videoconferencing, and “videoconference etiquette”. To get better productivity, best use of time, and the best experience here are a few guidelines:
Put some thought into the best time to schedule your videoconference if you want better participation and attention from everyone involved. Unless it’s a regular weekly kick-off meeting avoid Mondays as people can often have other higher priorities at the beginning of the week, are working on planning and shaping their working week, or are still addressing what was left over from Friday. Although this may sound a little surprising, first thing in a the morning is also not the best time as it prevents participants from doing their daily morning tasks and checks and doesn’t allow any time for final pre-meeting preparation.
Final tip; don’t have any video conferences on Friday if it can be avoided, because not only may participants be exhausted and distracted at the end of the working week but highlights and action points from the videoconference may be lost over the weekend.
A good recommendation is Tuesday to Thursday, either at mid-morning or mid-afternoon (not during post-lunchtime slump), and of course these are not hard fast rules and there will be experts that don’t agree. There are many dependant factors such as the type of business, the type of department, and geographical spread of the participants.

  • Whenever possible schedule the videoconference in advance to allow participants to prepare and free up the allocated time. Allow participants the option to login 10 minutes before the meeting is scheduled to start, start on time, and end the meeting at the scheduled ending time.
  • Before you schedule your videoconference double check that you have a clear purpose for this meeting and at the very least a loose agenda.
  • Draw up your invite list and check off that each participant can either add value to the meeting or has a reason to be included. The fewer participants the better the focus.
  • Schedule enough time to cover the agenda plus a small amount of additional time at the end for questions and a roundup of actions. Don’t be over generous with time, shorter is always sweeter.
  • Be prepared, focused, and ready when it’s time to start the videoconference. Make sure you have completed any pre-reading or research and jotted points down you want to cover before you start. Having a notepad and pen at your side is always useful to catch any points during the videoconference.
  • Allow everyone to greet each other or introduce themselves and start with small talk to set a positive and inclusive atmosphere. This will also help encourage participation throughout the videoconference.
  • Give everyone a fair chance to participate and give input.
  • Always send a follow up email that incudes highlights and action points as this also gives the participants an opportunity to give their feedback and contribute.