Updates Archives - Infinity Network Solutions https://test.infinityns.ca We're experts at being experts. Tue, 07 Aug 2018 15:58:19 +0000 en-CA hourly 1 https://wordpress.org/?v=5.9.3 https://test.infinityns.ca/wp-content/uploads/2018/02/cropped-Infinity-symbol-32x32.png Updates Archives - Infinity Network Solutions https://test.infinityns.ca 32 32 SEND AND RECEIVE LARGE FILES SECURELY https://test.infinityns.ca/send-receive-large-files-securely/ Thu, 15 Mar 2018 22:03:12 +0000 https://test.infinityns.ca/?p=1653 A NEW PARTNERSHIP WITH LIQUIDFILES Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable. A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to [...]

The post SEND AND RECEIVE LARGE FILES SECURELY appeared first on Infinity Network Solutions.

]]>
A NEW PARTNERSHIP WITH LIQUIDFILES

LiquidFiles

Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable.

A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to paid programs such as Citrix, ShareFile and Dropbox.

Features and benefits of LiquidFiles:

  • Send and Receive Unlimited File Size — LiquidFiles does not have the very common 2 Gb file size limit common in competing solutions and cloud services. LiquidFiles is limited only by the disk size you assign to it, enabling you to send anything from DVDs to massive CAD drawings without having to worry about file size limitations.
  • Transfer Speeds— Running a system on your own network is always going to be faster than a cloud service. When sending multi-gigabyte files, the transfer time can easily be several hours less, being the difference of getting there before close of business today instead of first thing tomorrow morning, like an old-school courier delivery.
  • Security — When something is installed in your own network, in your security perimeter, in your control, with your security configuration. It will always match your security requirements with no questions raised of who might also get access to your secret and sensitive data. With Infinity Network Solution’s partnership with LiquidFiles you will feel safe that your data is secure.
  • Branding — You can make LiquidFiles look like a complete internal solution with your own logos, colour scheme and no LiquidFiles branding on anything that your users, customers or partner sees. Every user visible text string and all emails sent from the system is changeable to your liking. You will look like a pro.
  • Self-Managing — LiquidFiles is built to be as easy to use as it can possibly be, and as self-managing as possible. All files sent have an expiration date and will be automatically deleted at the time of expiration. You can assign roles based on LDAP/Active Directory Group belongings and almost all settings are configured on a per group basis and so on. All of this is to make ongoing maintenance a breeze with as little ongoing configuration as possible, leaving more time for you to focus on other things.

As a LiquidFiles partner, Infinity Network Solutions enjoy partner pricing and support from LiquidFiles to integrate the solution into our client’s environments to ensure happy joint customers and an overall integrated security capability.

 

The post SEND AND RECEIVE LARGE FILES SECURELY appeared first on Infinity Network Solutions.

]]>
The device you’re using right now has a big security flaw — but you don’t have to panic https://test.infinityns.ca/device-youre-using-now-has-big-security-flaw/ Sun, 07 Jan 2018 20:53:16 +0000 http://sitedevo.infinityns.ca/?p=1158 There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic. To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically [...]

The post The device you’re using right now has a big security flaw — but you don’t have to panic appeared first on Infinity Network Solutions.

]]>
There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic.

To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically remain private.

The researchers announced the discovery publicly this week — calling the two bugs Meltdown and Spectre — and warned the security of everything from passwords and encryption keys to documents and photos could be at risk.

‘One of the worst CPU bugs ever found’
But while the problem is serious, and an inherent part of how most modern computer processors are designed to function, there are already efforts to minimize the impact and help you get on with your life.

What do I need to do?

For most people, the same advice as usual applies: Make sure the applications and operating systems on your phones, laptops, and other devices are up to date.

If you’re using a Mac, iPhone, iPad, or Apple TV, Apple recently rolled out an update that attempts to mitigate the problem, with more fixes on the way, according to the company.

Google says the latest version of Android already contains the necessary fixes, while Microsoft pushed out an automatic update for Windows users Wednesday night.

Computers running Microsoft’s Windows operating system should automatically receive a software update designed to mitigate the Meltdown flaw disclosed by researchers this week.

PC users will also require a separate CPU update from whoever made their device (for example, Lenovo or HP). “By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years,” the chipmaker said in a press release.

You’ll also want to update apps like your web browser and anti-virus software when they become available. Developers are beginning to roll out fixes to make it more difficult for sensitive user data to be accessed.

What are these updates trying to fix?

The two flaws let attackers access parts of a computer’s memory that they shouldn’t normally have access to, by abusing the way that computer processors are designed to handle information more quickly.

One of the flaws, called Meltdown, allowed the researchers to access data stored in the kernel — the core of a computer’s operating system, which runs in a protected part of a computer’s memory, and effectively watches over everything your computer does.

By design, applications can’t access the kernel, a protection that’s built into the hardware of the CPU itself. But the researchers found a way around that, giving them access to the kernel and, from there, any data stored in a computer’s memory — which could include everything from passwords to photos. This attack has only been found to work on processors made by Intel.

“The bug basically melts security boundaries which are normally enforced by the hardware,” the researchers wrote.

HOLIDAY SHOPPING

One of the software flaws identified by researchers only affects processors made by Intel, while the other affects AMD and Intel chips as well. The processors are found in virtually all modern phones, computers, and servers.

The other flaw, called Spectre, allowed researchers to target data that applications store in a computer’s memory directly (typically, applications can’t access the memory used by other applications).

It’s related to Meltdown, but differs in a number of ways that the researchers detail in a pair of technical papers. This attack was found to work on Intel, AMD, and even ARM processors, which are commonly used in mobile devices such as smartphones and tablets.

How would someone attack?

The same way that most other types of attacks work: by gaining access to your computer.

As such, the usual advice for dealing with malicious software applies here too. Install updates when they become available, and always scrutinize the apps you install, the files you open, and the links you click.

But everything will be fine now, right?

Sort of. While Meltdown can be patched, Spectre will be much more difficult to defend against long-term because of the way that CPUs are designed — and that’s worrying, because it’s the vulnerability that affects a far wider range of chips.

The researchers say any Spectre-specific software patches for applications, operating systems or CPUs should be considered stopgaps while more research takes place.

“As it is not easy to fix, it will haunt us for quite some time,” the researchers wrote.

All of the big cloud providers — Amazon, Google and Microsoft — say their systems have been updated to help prevent Meltdown-style attacks, but customers are being advised to patch their own systems as well.

Who’s most at risk?
Home users aren’t at any more risk than usual when new bugs and flaws are discovered, as long as you install your updates.

For cloud computing providers on the other hand, this is a nightmare scenario.

In the cloud, multiple customers typically share the resources of a more powerful computer by running their applications and services in a so-called virtual machines. However, the researchers warn Meltdown can be used to access data from beyond the virtual machine — data from the host computer, or even inside other customers’ virtual machines.

All of the big cloud providers — Amazon, Google and Microsoft — say their systems have been updated to prevent Meltdown-style attacks, but customers are being advised to patch their own systems as well.

Why do these issues even exist?  The researchers sum it up pretty nicely in one of their papers: “The vulnerabilities in this paper, as well as many others, arise from a longstanding focus in the technology industry on maximizing performance” — but at the expense of security.

In fact, the flaws detailed by researchers this week are so fundamental to the design of modern processors that the only way to truly prevent any attacks is for Intel, AMD and ARM to redesign their chips. In fact, the Software Engineering Institute’s Computer Emergency Response Team (CERT) was especially blunt in its proposed solution: Get a new CPU.

Of course, that’s not going to be practical for most people and businesses, and so hardware and software companies are attempting to mitigate the two flaws’ effects with software updates the best they can.

By Matthew Braga, CBC News Posted: Jan 04, 2018 4:11 PM ET

The post The device you’re using right now has a big security flaw — but you don’t have to panic appeared first on Infinity Network Solutions.

]]>