5 Threats of Security Breaches to Businesses

Posted by Stefanie Kober Tue, 15 Jul 2014 12:41:00 GMT

The year 2013 is synonymous with cyber attacks and numerous data breaches. Individuals and organizations worldwide are now more aware of widespread surveillance and cyber threats. But what are the costs associated with business security breaches?

1.    Direct Financial Loss
Attackers may specifically target customers’ credit card numbers, employees’ checking account numbers, and the company’s merchant account passwords. Especially in the financial services industry, indirect legal fees or fines resulting from the security incident can significantly increase the costs, independent of whether the criminal is brought to justice.

2.    Violation of Privacy
Employees are trusted to keep personal information private. Likewise, customers trust the organization to keep their credit card numbers and credit histories confidential. If this privacy is violated, legal consequences arise. 

3.    Lower Competitive Advantage and Lost Sales
Theft, modification, destruction of propriety sales proposals, business plans, product designs or other highly sensitive information can significantly give competitors a marked advantage. Sales are also lost as a consequence of the cyber attack, and the repercussions ensue long after the incident takes place.

4.    Damage of Corporate Reputation and Brand

Building and maintaining a corporate image and establishing trusted relationships with customers and business partners is critical to an organization. However, the corporate credibility and business relationships can be considerably damaged if proprietary or private information is compromised. 

5.    Loss of Business Continuity
In the case of a service disruption caused by a data breach, the IT team must quickly address the problem, so as to minimize downtime of the system, and restore data from backup files. Nonetheless, when mission-critical systems are involved, any downtime can have catastrophic consequences. In other cases, when lost data may have to be meticulously reconstructed manually, this decreases the amount of time that systems are functioning to below acceptable levels.

Business Network Protection
As discussed above, the consequences associated with security breaches are vast and long-lasting. Several organizations now use remote access solutions to maintain a high level of security for sensitive corporate information. In particular, many companies opt for SSL VPNs due to their flexibility – SSL VPNs are not restricted to employee remote access, but incorporate partners, contractors, and possibly also customers. The increasing amount of hacking attacks and sophistication of security threats demand the use of advanced network security via a high-quality VPN as a component of a comprehensive business security policy.

If you are interested in how to secure your network from cyber attacks, we invite you to visit our website www.hobsoft.com. On our website you will be able to find data sheets of our VPN solutions as well as interesting e-books and whitepapers.

Author: Hazel Farrugia

no comments |

5 Best Practices to Boost Remote Worker Productivity

Posted by Stefanie Kober Thu, 10 Jul 2014 10:44:00 GMT

Today, mobile workforces stay connected in and out of the office and use their devices for work and personal purposes. The ultimate goal of a remote working strategy is to increase productivity and reduce costs; indeed, studies by Best Buy, Dow Chemical and many others have proven that teleworkers are 35-40% more productive than their in-office counterparts.

The drafting and implementation of an organization-wide workplace strategy will ensure that end users at all levels of the organization will enjoy a positive experience. The following are five best practices that effectively boost remote workers’ productivity:

1. Maximize Employee Participation
Maximizing employee participation is the first step to maximizing employee productivity. Not all employees benefit equally from remote working; however, without a critical mass of users, the benefits will be limited. IT teams should not restrict solutions, such as mobile workplaces, to only those who “seem” to need it. Remote working allows employees to respond to colleagues and customers faster, therefore IT teams and managers should not deter employees from working anywhere and anytime.

2. Ensure Employees Have the Productivity Tools they Require

Employees should be encouraged to use a wide range of productivity tools which do not pose network security risks. However, if IT teams are uncertain how to handle such employee requests, they generally allow employees to use these tools without providing adequate security, or block the use of the tools entirely. Regardless of the circumstances, IT teams should circumvented security risks by deploying security solutions that allow employees to utilize tools without compromising the network security.

3. Free Use of Personal Apps and Services
Whether the device is personally owned or provided by the company, employees should be able to use their personal apps and services. Blocking an employee from storing their personal information with a cloud service provider is significantly different from ensuring corporate data does not end up in the public cloud. IT teams should focus on controlling data rather than controlling devices.

4. Offer Self-Service Support for Everyday Activities
There is a common notion that mobile devices will result in an increase in support costs – however this is a misconception. Conversely, if the IT teams provide a self-service capability, particularly for routine activities, it usually results in decreased in support costs. IT teams should stop short of supporting personal apps and services, but should invariably offer to assist with supporting business apps.

5. Support Wide Range of Devices
For the mobile workplace program to be widely adopted, the program should support a wide range of devices. Though challenges may arise, such as Android’s variability regarding support for on-device encryption and other enterprise-level security and management controls, the overall benefit is net positive.

The Future of Remote Working
The current trend towards remote working is expected to become even more prevalent in the future. With the right practices and controls in place, employee productivity can be maximized, without putting the security of the network at risk.

If you would like to learn about the advantages and limitations of mobile workplaces, and find out how to develop a strategy for mobile workplaces with the help of VPNs, please download our free eBook “Home Offices Made Easy”.

Author: Hazel Farrugia

no comments |

6 Reasons Educational Institutions Should Use Remote Access Technology

Posted by Stefanie Kober Thu, 26 Jun 2014 09:49:00 GMT

The Background

Remote access via virtual private networks (VPNs) is a major technological advancement reshaping organizations worldwide, including educational institutions. The IT solutions of all educational institutions, ranging from primary schools to universities, face unique challenges in order to provide a more advanced learning and working environment, while also maintaining security requirements and optimal IT efficiency.

Common Applications in an Educational Institution:

Educational institutions require numerous IT applications, which are managed by the network support teams. These include: 

  • email accounts for students and faculty
  • secure email access
  • intranet set up and functionality
  • web and mail services
  • storage and management of sensitive data
  • online examination management and results posting
  • secure intra-departmental data transfer
  • secure remote access to server rooms and on-site data centers; and
  • maximum security levels preventing hacker attacks, and enabling secure login and sensitive information transfer

In addition to providing a secure mechanism to access the above list of necessary applications, IT administrators are also responsible for minimizing network downtime, monitoring uptime, and keeping service costs under control. In order to provide this, remote access technology is the optimal solution.

Reasons for Using Remote Access:
1.    24/7 Accessibility
Remote access through VPNs provides cost-effective 24/7 data access to students and staff from anywhere.

2.    Reduced Security Concerns 

VPN technology allows secure remote access to educational resources and individual desktops for faculty and staff members through encrypted connections, via Web Secure Proxy and secured authentication methods.
Innovative remote access solutions implement a security strategy that also includes firewalls, anti-virus software and intrusion prevention services to protect vital and sensitive information within the network.

3.    Reduced Investment in Technology Infrastructure
Due to the potential for mechanical failure, hardware solutions are prone to break downs. Initial costs and costs to repair cause hardware solutions to be significantly less viable than pure software solutions. Additionally, software solutions enable IT administrators to resolve several problems remotely, thereby further reducing costs and resource use. The implementation of a software based solution has the additional benefit of optimizing existing server resources, which reduces total cost of ownership.

4.    High Availability
Access from the client requires a Web browser only. This allows for specialty software applications to be made more readily and widely available to the students, staff and faculty. This high application availability allows for e-learning programs and superior online delivery methods after school hours.
The total enrollment in public and private postsecondary institutions increased 47% between 1995 and 2010, and a further increase of 15% is expected between fall 2010 and fall 2020. The growth in the number of students attending educational institutions puts network administrators under pressure to increase the amount of PCs and network facilities in order to accommodate their staff and students. An increase in terminals necessitates an increase in the number of servers; since these servers are the pillar of the institution’s Network, it is important that they be consistently reliable, as network downtime implies an interruption of essential services.
High-quality VPNs allow for workload balancing of cluster servers, meaning the division of a computer/network’s workload between two or more computers/servers. This process facilitates the system’s optimum performance, which results in faster data access. Load balancing also prevents failover, which occurs when a user cannot access a database in a cluster - either because they cannot access the database itself or they cannot access the database server.

A VPN is highly scalable and supports many different platforms. VPN technology provides remote access via any device, such as desktop computers, notebooks and tablets, and all operating systems are supported, including Microsoft Windows, Apple MAC OS X, and Linux. In addition, this technology allows educational institutions to purchase resources as needed. If the institution experiences significant growth, it can easily increase the capacity of their remote access solutions. Conversely, if their needs decrease, they can scale down.

6.    Single Sign-On
Single sign-on is a capability that enables secure authentication across many services with only one password.  It allows users to be logged into multiple services once the user has signed in to one. Single sign-on streamlines the authentication process for the user, while simultaneously protecting the institution’s resources.

Remote access technology has proven beneficial to several organizations as it optimizes resources, decreases administrative costs, increases productivity and enhances the learning process. Today, remote access technology for educational institutions is considered an essential part of a comprehensive IT security infrastructure.

Author: Hazel Farrugia

no comments |

The Role of WAN Clustering in Load Balancing

Posted by Stefanie Kober Wed, 18 Jun 2014 13:08:00 GMT

In one of our last blog posts, we introduced the concept of WAN clustering (the use of multiple redundant computing resources housed in different geographical locations that form, what appears to be, a single, highly-available system), and its role in disaster recovery and business continuity. Part II takes a deeper dive into WAN clustering and its role in load balancing.

The Need for Load Balancing
In the Internet Age, the networking (connecting) of enterprise IT infrastructure to its customers or suppliers has become mission critical. Data centers full of server farms were created by the proliferation of servers for diverse applications. The complexity and challenges in scalability, manageability, and availability of server farms is one driving factor behind the need for intelligent switching. It is unacceptable for a network to fail or exhibit poor performance, as either will virtually shut down a business in the Internet economy. In order to ensure scalability and high availability for all components, load balancing emerged as a powerful tool to solve many of the issues associated with network failure and poor performance.

Load balancing is the division of computer/server/network workload amongst two or more computers/servers. Load balancing can be implemented with hardware, software or a combination of both.

In the case of load balancing Web traffic, there are several options. For Web serving, one option is to route each request to a different server host address in a domain name system (DNS) using the round-robin technique. Usually, if two servers are used to balance a work load, a third server is needed to determine to which server work is assigned. Another option is to distribute the servers over different geographic locations.

Benefits of Load Balancing
This technique offers a number of important benefits, including increased network utilization and maximized throughput; minimizing the load on individual systems and decreasing response time; improved user satisfaction, reliability and scalability.

Generally, load balancing is the primary reason IT teams opt for a clustering architecture. Companies whose websites receive large volumes of traffic also commonly select clustering architecture, so as to avoid a situation where a single server becomes overwhelmed. Workload balancing of cluster servers facilitates the system to attain optimum performance, resulting in faster data access. 

Additionally, the process also prevents failover, which occurs when a user cannot access a database in a cluster, due either to inability to access the database itself or inability to access the database server. 

VPN Technology
Virtual Private Network (VPN) technology is also critical to an effective load balancing strategy. A fast, safe and secure transfer of critical business data among servers optimizes the user experience, while simultaneously giving employees/users anytime, anywhere access to critical information.

As implementation of web applications grows and user bases become more geographically diverse, load balancing becomes increasingly less of an option, and more of a requirement in IT planning and provisioning. Load balancing enables organizations to run uninterrupted operations when WAN clustering is supported by reliable, well-managed VPNs.

If you would like to learn more about WAN clustering, and explore how VPNs can help you to create an optimal WAN clustering solution for your needs, download this free eBook:
Effective WAN Clustering Relies on High-Quality VPNs

Author: Hazel Farrugia

no comments |

The Role of WAN Clustering in Disaster Recovery and Business Continuity

Posted by Stefanie Kober Tue, 10 Jun 2014 13:24:00 GMT

Remote access through a Virtual Private Network is essential when an organization’s operations have been disrupted. WAN clustering allows business continuity in the event of a natural disaster or cyber-attack.

As the majority of mission-critical business processes are IT-based, companies and institutions are becoming increasingly dependent on the availability of their digitized information in order to maintain functionality. The ability for a network to recover from a disaster is a function of its hardware and software architecture.

In today’s business environment, server clustering is essential to providing the high availability and scalability of services that are required to support 24/7 operations. Clustering increases the reliability of Internet-based systems because it eradicates several of the single points of failure that are possible in a single server system.
WAN clustering, also called geoclustering or remote clustering, is a network architecture through which multiple servers and other computing resources housed in different geographical locations form, what appears to be, a single, highly-available network. WAN clustering can be used for almost any computing resource, including mainframes, file servers and software application stacks.

Benefits of WAN Clustering
WAN clustering allows business environments to run operations uninterrupted and maximize employee productivity by ensuring information assets are available anytime, anywhere – a substantial competitive advantage.

Compared to server clusters which are not geographically distributed, WAN clustering’s main advantage is that applications are always available. Even in cases of extensive regional disaster whereby entire processing centers are destroyed, servers in the cluster continue running, with little to no interruption. 

Business Continuity
The ultimate goal of WAN clustering is to support enterprise business continuity, by providing location-independent load balancing and failover. Business continuity, defined as the ability to do business under any circumstances, is a vital to a company’s success. It aims to prevent problems before they happen, and in the case that they do, it ensures that there are the necessary tools and protocols in place to reduce the damage.

Network Connections
Formerly, stored data was connected to servers in very basic configurations: either point-to-point or cross-coupled, whereby the failure or maintenance of a single server often made data access impossible for a large number of users, until the server was back online. More recent advances, such as the storage area networks and cloud computing, make any-to-any connectivity possible among servers, data storage and other systems. Usually, these networks utilize several paths between the server and the network, each consisting of complete sets of all the components involved. A failed path can result from the failure of any individual component of a path. IT teams employ multiple connection paths, each with redundant components to avoid single points of failure, helping to ensure that the connection is still viable even if one or more paths fail.

Disrupted Communications and the Virtual Private Network (VPN)

When disaster strikes, disrupted communications inevitably ensue, rendering the normal operational tasks unavailable. However, workers can generally perform several tasks using remote access solutions such as a virtual private network (VPN).

Recovery options are extremely limited if applications and servers are not accessible via remote access or VPN service, since one may need to temporarily locate recovered users away from the server environment. A high-quality VPN facilitates safe, effective and cost-efficient WAN clustering – an architecture critical for organizations with offices around the world.

The Recovery Process
The functions of a particular server or entire network location are taken over by any server(s) at a different location should one server or network location becomes unavailable for any reason, such as scheduled down time, hardware or software failure, or a cyber-attack. This process occurs automatically, so that the procedure is as seamless as possible to the end user. A 2013 study on data center outages conducted by Ponemon Institute reported that 91% of the companies investigated had experienced an unplanned data center outage in the past 24 months; in cases of server downtime, WAN clustering makes business continuity possible.

The recovery process can apply to any aspect of a system, such as protection against a failed processor, network connection, storage device, Web server, as well as protection against locally limited natural disaster effects, such as flooding or blackouts.

Fundamentally, business continuity ensures a business can endure any emergency or disaster by safeguarding a company’s greatest assets: its employees and its data. The concepts of high availability and disaster recovery are made possible by WAN clustering, which relies on high-quality VPNs.

If you would like to learn more about WAN clustering, and explore how VPNs can help to create optimal WAN clustering solution for one’s needs, download this free eBook:
Effective WAN Clustering Relies on High-Quality VPNs

Author: Hazel Farrugia (Link to LinkedIn)

no comments |

The Government vs. Remote Access

Posted by Sarah Becker Tue, 03 Sep 2013 09:41:00 GMT

The adoption rate of cloud computing and remote access solutions has been exponential in recent years, as many different industries have fully migrated to cloud solutions.

However, one industry has yet to fully adopt the cloud—the government. According to cloud computing expert, David Linthicum, the government has been resistant to full migration to cloud computing and remote access due to complexities of federal business processes.

Despite the complicated nature of security regulations, government research organization, IDC Government Insights, released a study that took a detailed look at the government’s 2014 IT plans. According to the report, the U.S. government experts to spend $118.3 million on public cloud solutions. This new budget is an increase of 32.8%. The implications of this budget proves that in the next year, the government will be more focused on developing an IT strategy that will allow the adoption of cloud computing.

We, here at HOB, hope to see an increase of the government’s use of cloud computing and remote access solutions as our products are designed especially to meet the growing security and compliance requirements. For example, our flagship product, HOB RD VPN, has extensive security perfect for critical government data.

HOB RD VPN supports government agencies in successfully integrating secure remote access solutions into their existing IT infrastructures – for 24/7 secure remote access to data and applications, at any time, from anywhere around the world and with any device. This software solution also enables encrypted data communication using SSL and supports various state-of-the art authentication mechanisms like Kerberos Single Sign-On. Additionally, HOB RD VPN allows government agencies to implement client-side SSL-certificates, e.g., on Smartcards, and supports the usage of one-time-password solutions within their compliance strategy.

Do you think the government’s adoption of cloud computing and remote access solutions will be successful? Please share your thoughts in the comments below.

no comments |

Cloud Don’ts: How to Achieve Success When Adopting the Cloud

Posted by Sarah Becker Wed, 21 Aug 2013 14:39:00 GMT


The cloud has granted many enterprises with endless benefits including streamlined business processes and improved flexibility. However, as the cloud becomes a necessity, a number of enterprises are realizing that cloud migration requires more effort than they had assumed.


The most common mistake that enterprises make when adopting the cloud is lack of research. We want to make cloud migration easy on the enterprise. Here are a few Cloud Don’ts to make sure you stay on Cloud 9:

Don’t Always Choose What Is New

When selecting a cloud service provider, many assume that the latest cloud software is the best option for their enterprise. In reality, all clouds are not created equal. It is important to be aware of the differences between basic data storage providers and the wide range of IT networking infrastructure with on-demand access to servers, applications and software.

Don't Forget to Plan

When adopting your new cloud computing solution, don’t forget to plan for security, governance and compliance. Failure to plan results in a system that will not provide proper services to enterprise employees and will not a pass audit. Furthermore, failure to abide by security policies and regulatory requirements will result in large fines and legal issues.

Don’t Assume You’re Immune

The cloud is a certainly an efficient method to store data, but do not assume that cloud service providers are immune to security breaches, hacks or website crashes. Ensure that a third party also consistently backs up enterprise critical data.

The cloud is a remarkable invention, but it is important to recognize the nuances so that we can properly handle cloud migration for our enterprises! Please share additional cloud don’ts in the comments below.

no comments |