Our Internet Security Policy

Human Life Security Layers

Humans make or break security. Infotel Systems is a family owned and run business. The CTO and the CFO /security auditor have offices 30 feet from the data center and live 1 mile away. When your retirement security is based on Internet security, you get obsessive.

All staff are fingerprinted and registered with the Virginia Department of Criminal and Justice Services.

Our average employee has worked here 12 years.

We operate our own data center, security is necessity

We have multiple Internet connections, servers, routers and thus we have in theory a large “surface area” of attack. Our Internet security depth of knowledge is based on necessity. We have all of this at our data center. More layers are better. Everything fails.

We also micro segment networks at our data center and at customer sites.

 

The Network Security Layers 

Verified data backup is a must when all steps below fail
Click here for details

Computer server security 

  • Operating System Patches are scheduled and attended.
  • Virus protection software from a paid service with virus updates set to daily.
  • Daily server health monitoring from our data center.

A firewall stops travel to risky destinations. It’s like GPS on a teenager’s car  

We provide an advanced security router using professional install services from the manufacturer. You attend the session and answer questions such as,

  • May we lock out access to/from Russia, China and Iran IP addresses?
  • Who needs social media access at all or at what times
  • Can we restrict surfing to 100 web sites? Will you accept an open Internet research computer on it’s own network?
  • May we shut down Internet access and or wifi at certain times?
  • Restrict access to a current MAC list. A visitor’s laptop would not work with a hard wired connection.
  • Only DNS, HTTP(S), DHCP and ICMP services for LAN and WiFi interface.

If you want us to handle it all, we will lock it down to the point of “mildly annoying”

PC Anti-Virus is the “facemask” for what got past the firewall

  • Operating System Patches are set for Automatic Updates.
  • PC based anti-virus cost just $35/year per PC.

Active Directory (AD) server controls your staff’s behavior 
A computer virus is a malicious software program that runs on your PC. Prevent virus installs and you prevent viruses.  An AD server is a guard that tells work stations what it can and can not access or install, enforces complex passwords and password changes, restricts users to only the required network directories for them to do their job.

Added security against human behavior

  • Simulated safe email phishing attacks to hack your employees urge to click on untrusted hyperlinks. This is another 3rd party audit point.
  • Security cameras archive video and/or audio at your premise and archive offsite if desired.

VPN connections for voice and data traffic

We use 256bit encryption VPN tunnels to connect to our customers. We started using encrypted voice back in 2004 before anyone else.  Now, it’s a VoIP requirement for many industries.

Isolated voice and data networks

  • Physical separate voice and data cabling and Ethernet switches are provided.
  • Logically separated VLANs from the edge router are programmed.

Mobile Devices

We prefer IOS over Android. We can extend group security policies to these devices.

Cyber Insurance

Just our opinion. The industry is young and coverage has many gaps. Yet, it’s sometimes required by your business partners. Money spent on prevention via the above methods to include 3rd party audits increases your chance of being paid for a cyber claim.

Things we do at our own cost