Fognigma VPNs

Benefits of Using a Fognigma VPN While Working Remote

Fognigma VPNs While Working Remote

Organizations all over the United States have closed their doors and implemented work from home policies due to the recent COVID-19 pandemic. With that, security is most likely the number one concern in organizations right now. 

Fognigma Virtual Private Networks (VPNs) are the ideal solution when it comes to security concerns, especially during this work from home time. Continue reading to learn more about the benefits of using Fognigma VPNs and how your organization can benefit from using them while working remote. 

Benefits of Fognigma VPNs

Encryption and Connection Security: Every connection within a Fognigma network features two layers of encryption, using two-separate cryptographic libraries, which means that Fogngima networks are immune to zero-day cryptographic compromises. You don’t ever have to worry about your data being exposed. 

Total Network Invisibility: Fognigma allows your traffic to hide in the vast pool of IP addresses allocated to the millions of people who are using the Cloud at any one time, recycling IPs that have been used by others in the past and will be used by others in the future. All access to the Fognigma network is protected by firewalls, so your networks and nodes do not appear to exist when scanned, probed, or attacked. 

Anonymity Without Compromise: With Fognigma’s technology, no one can trace your networks back to you or your organization. 

Secure Network Automation: Using Fognigma’s built in scheduling feature, you can completely automate production of VPNs and resources, allowing your organization to create secure, fully encrypted networks without the need for dedicated operators. Users can instruct the engine to create, edit, or destroy VPNs and resources automatically at different times on specific days of the week. This streamlines the VPN setup process and allows your organization to accomplish more, while spending less time on the network management. 

How can Organizations Benefit from using Fognigma VPNs While Working Remote?

VPN While Working Remote - Fogngima VPN

Fognigma VPNs are Easily Deployable: Your entire organization can be secured in on-demand networks in just the click of a mouse. This leaves less time for unnecessary security steps, and more time to focus on necessary job responsibilities. 

Completed with Secure Communication and Collaboration Tools: Fognigma networks are equipped with all the communication and collaboration tools organizations need to work from home. Video conferencing, encrypted telephony, secure file servers, sandboxed VDIs, and user specific message and file encryption are all components available within Fognigma networks. 

Burned After Use:  When users are done working for the day, Fognigma networks can be destroyed in the click of a mouse leaving absolutely no forensic footprint. Then, spun back up when remote users are ready to start working the next day. 

Fully Encrypted: Every connection within a Fognigma network is encrypted with AES-256 encryption. Whether your users have a team video conference, share sensitive documents in the group chat or browse the internet for company research they are completely secure. 

Networks Are Only On When You Need Them: Fognigma networks are not time consuming, expensive and high maintenance networks, they are on-demand and only exist when users in your organization need them. 

Fognigma networks are the perfect solution when it comes to securing your entire organization while your users are working from home. Fognigma networks are completely private to your organization and invisible to third parties. Everything organization’s need to do their job, whether in the office or at home, are inside of Fognigma networks. 

It’s not too late to secure your organization. Get started with Fognigma VPNs today. 

Easily Secure Your Organization's Remote Work Environment

Easily Secure Your Organization’s Remote Work Environment

Easily Secure Your Work Environment - Fognigma

The COVID-19 pandemic has left many companies with little time to prepare for remote working. There is no doubt, this leaves the door open for vulnerabilities when it comes to companies sensitive information. 

During this trivial time, its imperative employees continue to effectively work even remotely. But how can they do so when they work with confidential company information and don’t want to risk potential intrusion? 

With Fognigma, remote work environments are made easy. Your entire company, no matter the size, no matter the location, can have secure remote work environments up and running quickly. 

Fognigma lets you create and deploy custom VPNs in minutes, and is completed with secured communications and collaboration solutions such as: 

Video Conferencing - Fognigma

 

Video conferencing with screensharing and chat features

Users can virtually communicate face-to-face in trusted and untrusted environments. Video conferences are completely encrypted at both ends for total protection, globally accessible, and supported on devices running all major operating systems. 

Private, encrypted telephony networks with conference calling, and chat server integration

Holler is an encrypted telephony service that uses interchangeable SIP numbers from around the world to provide specialized voice calling configurations for any situation. Holler allows users to speak and text with third parties without revealing their true numbers. Holler leverages intermediary SIP numbers to ensure user anonymity. 

Secure File Sharing - Fognigma

Secure file servers

Secure file sharing has never been easier. Users just connect to their enterprise’s secure file share, and then treat is as an extension of their computer’s file system. Drag and drop to copy/move files in the file share. Additionally, special public links can be created if files need to be shared outside of the enterprise. Outside users will only be able to access the files and/or folders that were specifically shared with them. 

 


Sandboxed VDIs with secure local file transfer, file server integration, and more

Fognigma’s VDIs allow users to anonymously browse the Internet while appearing to be in almost any location around the world, can be destroyed within just a few mouse clicks, and can be completely customized to enterprises needs.  

End-to-end, user specific message and file encryption

Communications are protected by cascading AES-256. This chat messaging solution can be used anywhere in the world and works on any device running any major operating system.  Private and public groups can be created and destroyed as needed to ensure messages only get to those intended for. 

Through Fognigma’s user-friendly interface, you can automate and schedule custom VPN production, create and assign users and groups, and more. 

Using simple software or hardware solutions, users can secure their connections and safely access these resources from anywhere – whether at home or traveling. At the end of the workday, VPNs and resources can be destroyed in just a few clicks, ready to be redeployed the next day. 

Fognigma is the ultimate solution for a secure, easy to use, scalable remote work environment. 

Contact Dexter Edward to secure your companies work environments. 

Fognigma - Communication and Collaboration

Communication & Collaboration Solutions for Remote Work

Fognigma - Secure Communication and Collaboration for Remote Work

With the recent restrictions on large gatherings in response to the COVID-19 pandemic, companies all over the United States are implementing a work from home policy. With these abrupt changes come new security vulnerabilities – and little time to prepare for them. 

In an office environment, you can manage risks by creating a secure networking environment and implementing and enforcing security policies in your day to day operations. Remote work introduces countless variables – especially on such short notice – with each employee’s home connection creating a potential vulnerability. 

For companies that have implemented a work from home policy, sensitive data is more vulnerable than ever. Without the protection and convenience of a singular secured networking environment, cybersecurity measures for remote workers must be adaptable, easy to implement, and user-friendly. 

Dexter Edward specializes in cybersecurity solutions that allow users to communicate and collaborate securely and seamlessly, whether in the office, at home, or traveling for work. With a wide variety of products for any networking environment, Dexter Edward provides solutions to protect remote workers and company communication and collaboration from attackers. 

Fognigma Virtual Private NetworkNETWORK ANONYMITY

Fognigma VPN

Fognigma VPN is a specialized, customizable virtual private network (VPN) that provides streamlined, user-friendly access to protected communication and collaboration services, including file servers, chat servers, VDIs, and more. Fognigma provides anonymity without compromise, offering complete network control and management, total network invisibility, encryption and connection security, advanced firewalling, and secure network automation. 

Wicket

A Wicket is a small, portable misattribution device that connects to a Fognigma VPN and protects single users and small groups, as well as IoT and other network-enabled devices. Wickets are easy to use, making them ideal for securing a home environment – users connect their device to the Wicket, and it automatically creates a secure connection to a Fognigma Network, allowing them to freely access protected resources without risk. 

ENDPOINT-TO-ENDPOINT CONTENT ENCRYPTION

Content Encryption - Fognigma

Conclave

Conclave is an encrypted communication solution featuring end-to-end message and file encryption. Your team can send messages and share files, and Conclave automatically completes end-to-end encryption, so correspondence never exists in the clear outside of the users devices. This prevents eavesdroppers from accessing information while it’s in transit. Conclave works with all major operating systems and mobile platforms, providing seamless, secure access to messages and shared files from smartphones, laptops, or desktops. 

With Conclave, your team can communicate and collaborate quickly and securely – without the need for complicated, time-consuming encryption steps or additional security training. 

 

 

UNTRACEABLE CONNECTIONS AND RESOURCE OBFUSCATION

Portal Proxy

Portal Proxies are instantly generated PaaS instances that disguise the location of important resources and act as intermediaries for Fognigma engine requests to cloud providers. When users access a Portal Proxy, the Internet provider receives a request for the users to access a third-party PaaS provider website, and the destination website receives a request from the PaaS provider website. The true destination is hidden to any external observer, and it never links back to users. 

Portal Proxies can be used to hide Fognigma engines, sensitive resources, and more. This allows you to grant users access to needed resources without revealing their IPs. Portal Proxies prevent malicious users from compromising the locations of sensitive resources such as file servers, and can be deleted in seconds from the Fognigma web console. With Portal Proxies, your most sensitive data is safe from internal and external attacks. 

These are just a few of the solutions in the Fognigma product line. We offer additional solutions related to Internet misattribution, persona-based sandboxed VDIs, call and text misattribution, and more. 

Protect your sensitive data and company communication and collaboration. Contact us to learn more about how our products can help secure your company – no matter where you work. 

Secure Communication - Fognigma

The Telephony Solution Your Organization Needs

Fognigma Holler - Telephony Solution

It wasn’t that long ago that email was the standard communication tool for businesses, primarily due to its convenience, popularity, and accessibility. In the United States, 76% of adults use email. Globally, nearly half of the population uses email, and it’s easy to see why. It’s straightforward, user-friendly, and requires little technical knowledge.

But as technology continually shifts and creates new cybersecurity threats, email correspondence is no longer a reliable solution for secure communication. With the increase in phishing scams and other email attacks, organizations must respond with a new communication solution.

Phone calls and text messages remain popular due to their convenience, but like email, they lack essential protection against popular attacks. When your organization’s private information is on the line, a secure communication solution is essential.

Fognigma’s cutting-edge secure telephony solution can protect your organization’s users and data.

HOLLER

What is Holler?

Holler is a fully encrypted telephony service within Fognigma that uses interchangeable SIP numbers from multiple providers around the world to disguise your users’ numbers and provide specialized voice calling and SMS configurations for any situation.

The best part? Holler doesn’t require any specialized, complicated software. All Holler features are configured through the user-friendly console with just a few clicks.

Key Features of Holler:

Fognigma Holler - Telephony Solution

  1. Voice Call & SMS Dissociation: Holler routes voice calls and text messages through multiple intermediary SIP numbers. This allows users to speak with and text third parties without revealing their true numbers, preventing any association between the true caller and destination numbers. These call chains can be modified or removed at any time in just a few seconds.
  2. Obfuscation and Global Misattribution: With Holler, a user’s true number is never revealed to a third party. Holler supports up to three different SIP providers, allowing you to configure Holler features with numbers from countries all around the world. This obfuscation is twofold: it hides user numbers and allows you to maintain a regional appearance anywhere.

Holler makes secure, simple, and user-friendly calling and texting a reality. All communications are end-to-end encrypted. Third parties are unable to find where a call originates, where it ends, or what’s said during it.

With Holler, your organization’s private conversations stay private.

Want to learn more about how Fogngima’s telephony solution works? Contact us to schedule a demo at our headquarters or have us come to you.

Dexter Edward Mobile Security Header

Mobile Device Security: Four Attacks to Look Out For

Dexter Edward Mobile Security Solutions

According to Forbes, 60% of people use a mobile device for work purposes. As mobile usage continues to increase, so does the risk of organizations mobile device security. 

Earlier this year, Amazon CEO Jeff Bezos’ mobile device was hacked through a specially coded WhatsApp message. 

This incidence raises an important point: if one of the most successful technology companies is vulnerable to a data leakage attack, then so are other companies. Mobile security is a major concern for companies in 2020. Nearly all employees routinely access company information through their mobile devices. As with other forms of hacking, knowledge and prevention are often the best defenses against attacks. 

Here are a few of the most common types of mobile devices attacks that are hurting your company: 

1. WiFi Interference

Mobile devices are only as secure as the networks they use to transfer data. Network spoofing attacks continue to increase, but employees often skip securing their connection and instead rely on public networks. This leaves the door wide open for cybercriminals to steal private information. Connecting  to an effective VPN is a simple way to close these doors and save companies from data loss. 

2. Data Leakage

Data leakage, also known as data breach or data spill, is the act of releasing secure or private information to an untrusted environment. This happens when users improperly setup apps on their mobile devices and inadvertently allow apps to see and transfer their information – which is exactly what happened to Jeff Bezos earlier this year. 

Another great example is an employee tracking workouts at a company gym, revealing the headquarters location. 

Data leakage can also be caused by accidental disclosure. Due to the small size of a mobile screen, users sometimes select the wrong recipient when sending information. It’s a simple mistake, but the consequences can be severe. 

3. Social Engineering

Social engineering is one of the top causes of data breaches on mobile devices. These threats typically start with email. Mobile email applications often only display the name of the sender, which makes it extremely easy for an attacker to pose as a high-level user in an organization and fool unsuspecting employees into sharing sensitive information or granting remote access to protected resources. Employees should always be skeptical of email requests for system access or sensitive data. 

4. IoT Devices & Out of Date Software

Internet of Things - Dexter Edward

These days, the latest lightbulbs, refrigerators, thermostats, TVs, tablets, e-readers, and watches might have more in common than you’d expect. Many are part of the IoT, or Internet of Things. An IoT device generally refers to any internet-enabled piece of technology that you might not expect to have internet access, and often doesn’t require human operation. 

And when it comes to network security, that internet-enabled thermostat or refrigerator might not be so “smart” after all. Any device connected to a network is a potential threat, and many IoT devices have glaring flaws in their security, and often unsecured software and unencrypted communication.

Many of these devices are not supported with software updates – essentially becoming an open door for hackers. As the popularity of IoT devices continues to grow, it’s imperative that users understand their flaws and how they can compromise a network.

 

What  can you do to enhance the mobile device security in your organization? 

1. Implement a strong company policy on mobile security. 

This might sound like an obvious solution, but a little can go a long way. Incorporating security requirements into training, policies, and everyday activities can help ensure employees adhere to proper security practices when using mobile devices. 

VPN - Dexter Edward

 

2. Invest in effective VPNs that are easily accessible for employees who work on the go. 

VPNs provide a convenient means of accessing a secure network for accessing sensitive resources. When it comes to everyday users, sometimes accessibility and ease-of-use are the best solutions for preventing security mistakes. 

3. Enforce two-factor authentication (2FA) on necessary applications. 

Though mobile devices bring new risks, they can also provide solutions. 2FA provides an additional authentication step during the login process that requires a code that’s sent to a specified 2FA device. With this method, an attacker with access to a set of user credentials will be unable to sign in without access to the user’s device. 

In this new decade of cybersecurity threats and solutions, is your company incorporating enough mobile security practices to ensure its safety? 

Dexter Edward offers a secure, customizable, and user-friendly VPN service that includes communication and collaboration services, file sharing, and much more. 

Contact one of our industry experts today to learn more about how we can protect your organization in the new age of mobile security threats.

Automated Cybersecurity Solutions: Encryption

Automated Cybersecurity Solutions

Automated Cybersecurity Solutions: Encryption

With the latest advancements in artificial intelligence, machine learning, and advanced software processes come new cybersecurity risks. Hackers have more tools than ever before, utilizing new technology to automate their attacks on a larger scale.

With these automated attacks becoming increasingly sophisticated and relentless, it’s imperative to take prevention measures with an equally sophisticated automated cybersecurity solution. 

With the large volume of attacks automation and machine learning bring, your defense must be scaled to match. Automated cybersecurity solutions create faster risk prevention and reduces the volume of risks that require human attention, freeing you and your users to focus on the goals and tasks at hand. 

FIGHT AUTOMATION WITH AUTOMATION

Fognigma’s patented software provides secure, sophisticated, and automated cybersecurity solutions needed to address these threats. 

Reverb: What private telephony communication was meant to be. 

Fognigma’s Reverb provides a traceless telephony solution with encrypted telephone numbers, extensions, and call chains. This ensures your calls and communications are hidden from the world behind the invisibility of Fognigma networks. 

Under the protection of Fognigma’s sophisticated obfuscation technology, your telephony communications stay between caller and recipient. Third parties can’t trace where calls originate, where they end, or what was said. 

With Reverb, your private conversations stay private. 

Encrypted Instant Messaging For All

Fognigma provides instant messaging chat servers within its invisible and secure networks, protected by cascading AES-256 encryption. This dynamic and user-friendly solution eliminates the risks of phishing scams, works on any device running any major operating system, and is globally accessible. 

The best part? It’s fully automated, meaning your organization can immediately incorporate encrypted communication and basic file sharing into its day-to-day operations through a familiar, easy-to-use interface. 

When it comes to the security of your everyday communications, encryption should be easy for everyone. 

Automated CyberSecurity Solution: Securing Video Conferencing

 

Secure Video Conferencing and Screensharing

Fognigma’s secure and encrypted video conference solution allows participants to chat and share screens. This is ideal for team-building exercises, mission briefings, and other instances where face-to-face conversation is preferred. 

This also allows your users to communicate with untrusted outside sources without risk to either party. Fognigma allows your organization to video conference between trusted and untrusted parties without risking the security of anyone on either side.

This solution features end-to-end encryption, is globally accessible, and works on any device running any major operating system. 

Share Files Without RiskAutomed Cybersecurity Solutions: Secure File Sharing

Encrypted file shares are one of the safest ways to store sensitive data such as company polices, intellectual property, company communication logs, marketing collateral, and many other important files. 

Using Fognigma, you can create an encrypted file server within your private network, allowing your users to easily drag and drop files or share items with external parties using a customized link. 

Users can also access the file share using protected virtual desktop instances for even greater security.

Automate VPN management and accomplish more 

Using Fognigma’s sophisticated, fully customizable automation feature, you can automate production and access to all of the components mentioned above. 

In minutes, you can automate a schedule that will build, manage, and destory a VPN with any of the custom components mentioned above, allowing your organization to focus entirely on productivity. 

These are just a few of the powerful features available with Fognigma. Schedule a demo today to see how Fognigma can automate security for your organization. 

The Basic of Two-Factor Authentication- Dexter Edward

Why Two-Factor Authentication is Important

The Basic of Two-Factor Authentication- Dexter Edward

Today, more and more of our lives are happening on mobile devices, laptops and computers. So it’s no wonder why our digital accounts are the prime target for cyber criminals. 

Attacks against the government, companies and individuals are happening every day. High profile data breaches and password leaks are becoming more and more common. Cyber criminals are continuously developing more sophisticated hacking methods, making some security practices obsolete. 

Fortunately, for any organization, one simple method for protecting digital accounts remains effective: two-factor authentication (2FA). Learn more about why two-factor authentication is important. 

What is two-factor authentication?

Two-factor authentication is the method of verifying your identity by adding a second factor of authentication to your account. Incorporating 2FA adds an additional step to the login process. After users enter their credentials, 2FA prompts users to enter an additional code before they can access their account. 

Types of two-factor authentication

There are many types of 2FA available. Some are more secure than others, but all provide improved protection for digital accounts. 

Here are a few of the most common forms of 2FA: 

Software Tokens: 

Software tokens are the most popular form of two-factor authentication and requires software that generates a time-sensitive, single use passcode to use to access an account. The user must download and install a 2FA app on a smartphone or desktop, such as Google AuthenticatorAuthy, or Microsoft Authenticator. These applications are compatible with a variety of websites. 

Once the user configures the application with the account, it will begin generating and cycling through time-sensitive codes. 

To access the account, the user must use the code provided by the 2FA application to access the account. These passcodes are usually only valid for less than a minute. 

SMS or Voice-based Messages: 

SMS Message Two-Factor Authentication - Dexter Edward

In an SMS-based 2FA environment, a user attempting to access an account will be sent an SMS message containing the 2FA code. 

Similarly, voice-based 2FA automatically dials the user’s phone and verbally delivers the 2FA code. 

SMS and voice-based authentication is one of the least secure methods of 2FA.

Push Notifications: 

A user with a smartphone or computer can receive notifications when an authentication attempt is taking place. The user can view details related to the request and can approve or deny access through the provided link. 

Push notifications provide a more user-friendly form of security. 

Other forms: 

In Biometric 2FA, user identities are verified via fingerprints, retina patterns, and facial recognition. 

These types of authentication are in development and are sure to become more popular within the next few years. 

Why use two-factor authentication? 

Passwords, no matter how complex, are no longer as infallible as they once were. Cyber attackers can test billions of passwords in seconds. Furthermore, it’s extremely common for users to use the same password across multiple accounts, meaning once hackers have access to one account, they can gain access to other accounts with relative ease.

2FA provides additional protection to accounts that is independent of password strength, and more secure than traditional security questions, which can be guessed by hackers who can view public social media profiles. Dexter Edward incorporates 2FA support into several of their solutions that can help your organization be secure, encrypted, and traceless. 

online privacy

Online Privacy Methods

Protect your Online Privacy

As you venture out on the Internet, reaching and searching for information or as a portal for communication, one thing is clear: privacy is key. Because without privacy, anyone can intercept, analyze, and exploit your communications—and, eventually, the odds are someone will. It behooves you to take proper steps to ensure your online activities and conversations remain only between you and your intended parties.

There are many methods to remaining private online, some more powerful than others. Examining all your options will help guide you to make the best decision for your online security.

Private browsing is the minimal you can do to protect your online privacy

Private Browsing

Perhaps the easiest way to ensure some privacy online is flip that little switch and use a private browser window. Sometimes called incognito mode, private browsers hide some of what you do online, but only some. While exactly what they conceal varies from browser to browser, private browsers do have some aspects in common.

Many disable the browser’s history and web cache, hiding the record of what you are doing online. Often autofill will be disabled, preventing the risk of accidentally storing login credentials. Along that same thought, many private browsers will prevent you from remaining logged in to online accounts once you close the browser window.

So that’s all you need to be totally secure, right? Unfortunately, no. Though most private browsers clear your browsing history in the browser, a portion of it might remain on your computer or your ISP—bits that could be used to reconstruct your online activities. Also, a lot of their functions rely on you closing the tab when you are done. If you don’t close the window, the caches aren’t erased. As Hana Habib, a doctoral student at Carnegie Mellon, points out, “A lot of people use private browsing just to hide their activity from other people who might use their computer later. . . [a]nd for that, private browsing does a pretty good job of protecting users against that particular threat.”

VPNs are one method of online privacy

Virtual Private Network (VPN)

Another option for online security is using a Virtual Private Network (VPN). VPNs take your traffic and passes it through a VPN provider’s server on its way to your destination. With a VPN, your traffic and IP address are obscured, and your communications are encrypted. To an outside observer, you will appear to exist where the VPN server is, which is why VPNs are popular in countries with censor-loving governments (or for people trying to circumvent geo-specific website restrictions).

VPNs are much safer than relying on private browsing, but even they can have their drawbacks. For one, you are relying on the VPN service’s security choices. The big drawback of VPN services are their terms and conditions, specifically in regard to logging. TheBestVPN recently updated their survey of over 300 VPN providers’ privacy policies to see if their advertising claims were matched by their policies.

The good news is this analysis shows that only about 8% keep logs of your browser history (with another 9% aggregating your browser history with all their other users). The bad news is when those VPN services who log your IP address and timestamps (the where and when of your browsing activity). 40% of the VPNs analyzed log your IP address and 38% log timestamps of your activity. For a service claiming to keep your anonymous, those statistics are striking (and should remind you to really read all the fine print when trusting another company with your security).

Onion routing is another method to preserve your privacy online

Onion Routing

Onion routing is similar in some respects to a VPN in that your traffic and communications pass through another remote server. But, in Onion routing, everything passes through multiple servers with a new layer of encryption added for each server passed through. Each server only knows of the servers on either side of it, so, for example, the second server in a 3-server chain (that is, 3 servers between you and your destination) will not have any record of your IP address (or other particulars) or what your final destination is. Onion routing takes your online anonymity and security up to another level.

Unfortunately, Onion routing has a few drawbacks. First, because your traffic is passing through various servers in various parts of the world, it can be slow. This isn’t any fault of the Onion routing method, mind you, but rather the varying Internet speeds in different locations. Another drawback is, again, not due to the Onion routing method, but rather to those who use it to hide their activity. Because of some users using Onion routing to commit illicit or illegal acts, the whole system echoes with negative overtones for some. That is, people might suspect or associate users who just want privacy with users who are doing all the illegal things.

Fognigma Provides the Best Online Privacy

Fognigma

Fognigma is a patented enterprise software solution that gives organizations the power to build their own secure, encrypted and traceless networks and communications systems. Fognigma works by strategically leasing virtual machines over eight commercial cloud providers which function as one gestalt network. Inside this invisible, on-demand network are various communication components (VoIP, file share, messaging, video conferencing, and Virtual Desktop Infrastructure) which are afforded the same protection as the Fognigma network itself: FIPS 140-2 validated, cascading AES-256 encryption with two distinct encryption libraries.

Like Onion routing, the parts of a Fognigma network only know of their immediate neighbors, so even if one part could be found, it couldn’t compromise the whole network. Also, like Onion routing and VPNs (which makes sense, since Fognigma is a virtual private network), where you exit the network to the rest of the Internet is where it appears you are located. However, Fognigma takes that to the next level by giving organizations the power to create multiple exit points almost anywhere in the world and users the ability to dynamically switch exit points (and their perceived location) with just a few mouse clicks.

Fognigma takes all the best privacy features, wraps them in a massive level of encryption, and gives them to organizations to build and run their own invisible networks, never having to worry about the privacy policies of a distant VPN provider or the ofttimes stigma of Onion routing. To learn more about Fognigma and how it can help your organization (or to schedule a demonstration), contact us today.

Host your own secure file server

Setting Up Your Own Secure File Server: A Primer

Take Your Files with You

Just as the world never stops turning, our operations remain in constant motion. They take us on the road, in the air, and over the sea. We bundle up our technology and bring it with us so we can continue working, and no matter which types of tech we take along, one thing is always needed: our files. A secure file server can make all the difference.

Of course, you could take a thumb drive with your files wherever you go, but everyone knows how risky that is. Misplace the drive and your documents will most likely find a new life in dark places on the Internet where all sorts of bad things can result. Or, at the very least, multiple versions of the documents will be created, leading to version control confusion (i.e., you won’t know which version is the most recently updated and accurate).

The only answer is to have an online file repository where you can access your files, without creating and carrying around multiple copies. But which method is the best to create a secure file server?

Host your own secure file server

Cloud Storage Thunderstorms

The fastest way to give your files the gift of remote access is to upload them to a cloud storage server operated by one company or another. We won’t name cloud storage companies because for many, they are viable options for file storage. However, we will mention some of the potential security risks these cloud storage companies, as a whole, represent.

  • Lack of Crypto-Key Control – In simplistic terms, when files are encrypted, keys are created to encrypt and decrypt the files. If you don’t have the key, you can’t see the file. The problem with some cloud storage providers is they maintain ownership of the encryption keys, which means if the service was hacked, the hackers would have control over the encryption keys to your files.
  • Lack of Any Security Control – When you sign up for a cloud storage provider, they have their own methods of cybersecurity in place. You don’t have a say in what encryption they use, for example, or any other security features. In short, you are trusting their cybersecurity team with all your data.
  • Data Sharing – Sometimes cloud storage providers have shared data (or, at least, metadata) with third parties. When security is a prime concern, the sharing of any data about your data or your organization is potentially very harmful.
  • Shared Server Storage – When you upload files to a cloud storage provider, your files are stored on a section of one of their massive servers. If the file server gets hacked via another customer’s account, once again, the hackers can gain access to your files since they reside on the same server.

Host your own secure file server

Host Your Own Secure File Server

The easiest way to take total control over your file server needs is to set up your own. Though that might sound daunting, it is actually pretty simple. Plus, there are multiple manners of file sharing you can use. Here are a few:

  • NAS (Network Attached Storage) – NAS is one of the easiest ways to build a secure server, but it is reliant on you having the proper type of router. Some routers have USB ports for storage. Plug in a thumb drive, configure a few settings, and you’re the proud owner of a private server!
  • FTP (File Transfer Protocol) – FTP has been around for almost as long as the Internet. While it’s not exactly what you imagine when you think of a cloud server, FTP servers can be used to easily transfer large files. You can even add security measures to FTP. Use SFTP (Secure File Transfer Protocol) and you’ll be using SSH to protect the transmission of your files. Or, use FTPS (File Transfer Protocol Secure) which give you TLS encryption for data transmission.
  • HFS (HTTP File Server) – HFS is another protocol which has been around for some time. It can be set up quickly which is great for inexperienced users yet has tons of customizable options for the more advanced users.

The most important part, after you’ve determined the type of private server you plan to run, is to explore security options. You’ll need to do it all yourself (as compared to a cloud storage provider) but, as previously stated, you’ll have full control over your security. You can make sure your security measures are always up to date, your software properly patched, and access to your files exactly as controlled as you desire.

To learn more how Fognigma, our leading-edge enterprise software solution, can take your protected, online-accessible file storage to the next level, contact us today.

VoIP-vs.-Landline-Security

VoIP vs. Landline Security: A Comparison

Telephones Require Security, Too

Telephones were created to transmit person-to-person communication at a longer distance. Everyone knows that. It’s also expected by most people talking on phones that the conversation is only between themselves and the person or persons at the other end. But we in the cybersecurity world know that’s not always the case. We know that if communications are happening, there are always third parties trying to intercept those communications. Therefore, security is just as important for your telephony as it is for your networks, users, and other systems. VoiP vs Landline security is important for deciding which to use.

For office use, two types of phone systems are the most plentiful: hardwired landlines (also called PSTN, or public switched telephone networks) and virtual VoIP (Voice over Internet Protocol). Which is more secure: landline or VoIP? Let’s explore further.

Landline phones need security

Landlines

The oldest and more traditional method of telephony is the landline—wires literally stretching all over the world, physically connecting handset to handset (with all the switches, terminals, cables, etc. in between, of course). It’s a system and infrastructure that’s been built up over one hundred years and works via circuit switching (a dedicated link between the two callers that exists as long as the call takes place). By having an actual physical connection, landlines are quite secure. In order to intercept communications, the wires themselves must be hacked into. This is not impossible, but it is quite an undertaking. However, to get this innate security, one must pay for the infrastructure by way of taxes, per-call fees, and other applicable charges. Also, this technology is limited to only voice calls—no other type of data (SMS, video, other file types) can be transmitted.

voip vs landline security

VoIP

VoIP calls have the curse and blessing of traveling over the Internet. VoIP calls are more feature rich and can transmit voice, video, and files. Because calls are placed over IP, there are little to no fees per call. However, VoIP calls work via packet switching, in which the information is digitally sent over the Internet in sections via many different and ever-changing routes (to be reassembled when they reach the end caller). As this article on Lifewire points out, “It is easier . . . to intercept VoIP data thereby breaching your privacy.” The articles goes on to say, “Many of the nodes through which the VoIP packets pass are not optimized for VoIP communications, which renders the channel vulnerable.”

That was the curse part. The blessing comes in the form of cybersecurity. Since VoIP calls are traveling over the Internet, you can protect them using all the cybersecurity methods you use for your organization, networks, and users. Firewalls, encryption, VPNs, and virus and malware protection (yes, you can get malware from a VoIP call) can enrobe and strengthen the security of VoIP telephony. These security measures are just not available for landline phone systems.

Telephony security is important

One Final Warning

There is one other way to intercept any type of phone call, possibly one you thought about in the section about landlines, and that is eavesdropping. Yes, no matter how much security you put in place, someone simply could be listening in at your door or through an electronic device. This means the final telephony security measure is your own discretion. Are you in a secure location for a call? Is there the possibility that devices could be hidden around you? Is there anywhere more secure you could place the call? Along with the type of telephony your organization is using and its intrinsic and additional security measures, being aware of your surroundings is the extra step which will help your phone calls stay secure.

Fognigma’s telephony solutions take VoIP security to the next level, featuring leading-edge technology and the utmost in communications protection. To learn more how our solutions can help your organization or to schedule a demonstration of them, contact us today.