Firewall Protection - Vital information among the most coveted resources

Firewall Protection

Vital information among the most coveted resources

Money Movers Inc. is a fully PCI DSS compliant Electronic Funds Transfer Gateway processor. In plain English, that means we move a lot of data over a network. If we could not protect this information from unfriendly eyes, we would be out of business quickly and completely. So, the IT department works diligently to protect client information. That means it is necessary to have ironclad, hack-proof firewalls in place.

You probably know that you need firewall security; in fact, you may even already have a firewall management program in place. But, what exactly is firewall security? How do you apply it to your servers, and how do you stay abreast of not only the most current developments in protection, but also the most dangerous new Internet threats?

At their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you want to go out of your server and what you want to get in. Everything else is not allowed. Corporations like Money Movers Inc. often have very complex firewalls in place to protect their extensive networks. But here’s the problem: firewalls do not focus specifically on preventing hacking, and hacking has proven to be the biggest threat to any company that handles sensitive information through its networks.

“Cyber Hacking is a silent stalking time-bomb that threatens all Internet connections twenty-four hours a day, seven days a week,” said George Baldonado, president and CEO of Oasis Technology. “Most companies, corporations, and agencies don’t even know that it’s happening to them.

According to Baldonado: Armies of Cyber Hackers from all over the world are targeting our infrastructure, military, data, intellectual property, innovations, our ideas, and even our identity information. At their disposal are thousands of foreign computer ‘bots’ that churn out thousands of hack attempts per millisecond looking to gain a millions of dollars’ worth of information. Sooner or later the targeted network will fold or open up. Once it folds, either the network or application will crash, or worse, the data will be compromised.

“This affects all companies and agencies that use, store, or access sensitive information. It doesn’t matter whether the company is a doctor’s office, CPA office, military, state, county or state agency. Even companies that just process their charge cards using PC’s are vulnerable. Additionally, each of the millions of cyber hack attempts also congests the company’s network bandwidth until the bandwidth is so full of hack attempts that normal business cannot be transacted,” said Baldonado.

All you need to do is follow the stories about the massive hacks perpetrated on Target, Home Depot, Chase and other multi-national companies to realize that we are living in an era of rampant Internet thievery where anyone who has sensitive data of any kind is at risk if they do business electronically.

If you’re terrified, you probably will ask what you can do to bring your network up to premium levels of protection.

There is a solution. Oasis Technology has come up with a solution that we have implemented at Money Movers Inc., The Oasis TITAN Network Security Systems. TITAN is not a Firewall—its sole purpose is to protect and fortify firewalls to ensure data really is secure. After we put our TITAN into our server system we were able to document hundreds of hack attempts a week, many from China, and TITAN was turning them all away.

Oasis built TITAN because they had been mistaken for a processing gateway company with a slightly different name and by 2012 had become the focus of unrelenting cyber-attacks. So they developed TITAN to protect themselves. It worked so well that they began offering the device to other companies whose firewalls had significant holes and deficiencies in their architecture.

The system is designed for optimum performance regardless of location, network type, PC or MAC, Microsoft or Linux. Unlike traditional companies, Oasis also provides a comprehensive security audit to add further protection based upon industry security methods and procedures.

Oasis engineers can customize TITAN to integrate with a customer’s legacy security infrastructure.

This article originally appeared in the February 2015 issue of Security Today.

About the Author

Patrick E. Craig is a published author and blogger who writes regularly about the Electronic Funds Transfer and Automated Clearing House industry in his column ACH Review.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.