Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping
October 16, 2017
The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that's scheduled for 8am Monday, East Coast time, US.
In May 2017 the WannaCry ransomware wrecked devastation across Europe – within just hours 200,000 machines were infected, with organisations like the NHS crippled by the biggest ever cyber attack in Internet history.
ISN continues its commitment to professional development and maintains their ability to offer industry leading best of breed solutions by networking with industry leaders in the Microsoft world at MS Ignite.
ISN and Q Associates Announce a Strategic Partnership
August 24, 2017
Intuitive Systems and Networks Ltd. (ISN) and Q Associates Ltd., have announced a new strategic partnership. The partnership will combine Q Associates award winning expertise in IT infrastructure services with ISN’s specialism in networking and security to enable both organisations to offer a broader portfolio of services.
Cisco Mid-Year Security Report – Highlights, observations and roundup
July 28, 2017
Cyber Security: The Current State of Play
Cyber criminals are becoming ever more sophisticated and resourceful – and are increasingly inclined to lock systems and destroy data as part of their attack process.
The ultimate checklist to preventing & fighting ransomware attacks
July 14, 2017
2017 is the year of ransomware, says a recent report by the Institute for Critical Infrastructure Technology, an industry think tank. When it comes to battling ransomware, your best offence is a good defence.
‘Shadow IT’ is a term often used to describe information technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term ‘Stealth IT’, to describe solutions owned, specified and deployed by departments other than the IT department.
ISN are delighted to have been nominated as finalists for two categories in the Comms National Awards 2016. The CNA event recognises the achievements of those in the information and technology channel industry.
Adaptive authentication is an extensive fraud detection system in which risk-based multi-factor authentication is used to ensure the protection of users accessing websites, portals, browsers or applications.
Context-Aware Security: What is it, and why do you need it?
September 12, 2016
When it comes to securing the enterprise, the rise of cloud, BYOD and mobile working have changed the rules of the game. Today’s IT teams have to cope with ever more complex networks – opening up vulnerabilities to a rapidly expanding array of threats. And the proliferation of devices that are connecting to corporate networks has ramped up the number of endpoints companies need to monitor.
ISN achieves Cisco Express Security Specialisation – Next Generation Firewall
July 20, 2016
We are proud to announce that ISN has been recognised by Cisco for achieving the Express Security – NGFW Specialisation. This new certification signifies ISN has proven that we possess the capabilities to provide sophisticated, value -added Cisco NGFW security solutions through our in-depth technology skills, service offerings and sales capabilities.
Intuitive Systems & Networks Ltd (ISN) Achieves Premier Certification from Cisco UK&I
May 18, 2016
ISN announced today it has achieved Premier Certification from Cisco®. To earn Premier Certification, ISN had to meet standards for networking competency, service, support and customer satisfaction set forth by Cisco...
Intuitive Systems and Networks Secure Place on G-Cloud 6
February 19, 2015
We are delighted to announce that Intuitive Systems and Networks (ISN) have secured a place on G-Cloud 6 Public Sector Framework via our partnership with Bramble Hub, a key supplier to Crown Commercial Sector...