Protect

Virtual Private Network

Anyone who uses public Wi-Fi is at risk of a hacker viewing his or her online activity. Even wired connections can be tapped. Once your communication is intercepted, hackers gain access to critical systems such as your file server, databases, email and even online banking.

One of the smartest ways to protect your company data is through a Virtual Private Network (VPN). By using strong encryption, a VPN allows you to send and receive data as it travels across public, untrusted links, allowing the creation of a virtual private line between two points anywhere in the world. This keeps online traffic safe from prying eyes and tampering while providing the convenience that comes with a direct connection. Implementing a VPN allows employees and branch offices access to information that would otherwise be inaccessible due to technological obstacles. VPN provides security while removing some of these connectivity obstacles.

Two general categories of VPNs are site-to-site and dial-up.

  1. Site-to-site VPNs protect office communication without requiring installation of costly dedicated fibre lines. This is ideal for connecting a branch office to a head office. The implementation involves installation of special hardware or virtual appliance at each location.
  2. Dial-up VPNs, also known as road-warrior VPNs, are typically used for employees to access their head office when working remotely. It can also be used as a method for IT staff to securely manage data centre devices without exposing vulnerable management interface on the Internet. The implementation consists of the installation of a single VPN server and installation of VPN software on the connecting devices.

DataHive can recommend, design, implement and manage all types of VPNs to ensure your business communication is always protected. DataHive has implemented VPN solutions for the most challenging environments, ranging from protecting communication between China and Canada to reliably interconnecting to 3rd party VPN networks.

Also see: Certified Ethical Hacker (CEH)

Protection from Hackers

Many of us protect our homes and families by having an alarm system, and sometimes even cameras. Are you protecting your business in a similar way from potential hackers? Click on the links below to learn more about the different types of security measures your business can take to prevent a hack, and how the IT experts at DataHive can help.

Firewalls are an indispensable part of cyber security defense. But, they are often overlooked or not managed properly for upgrades or configuration changes.

If you have an un-maintained firewall, you are unnecessarily exposing your network to serious security threats that could have easily been blocked.

DataHive’s Managed Firewall service ensures that one of the most important assets in your cyber security toolbox is working in optimal condition. Leaving it to our IT experts means your firewall is being expertly managed on an on-going basis. A consistently well-managed, well-configured firewall blocks threats reliably and efficiently.

Plus, DataHive has a Certified Ethical Hacker (CEH) who can look for vulnerabilities in your business data protection, and share the results with you. This offers you the advantage of knowing where your data is exposed, so you can close those loops before a hacker gets in.

Call us at 1-403-313-1106 or toll free at 1-877-328-2448 to speak with our Certified Ethical Hacker about this service.

Also see: Certified Ethical Hacker (CEH)

DataHive has partnered with Cloudflare to deliver Web Application Firewall (WAF).

CloudFlare receives roughly 8.7 million security requests every second. CloudFlare Web Application Firewall (WAF) is constantly identifying and blocking potential threats with no changes to your infrastructure. It protects your website from common vulnerabilities such as:

  • SQL injection attacks
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)

Why choose CloudFlare WAF through DataHive?

CloudFlare is a global security measure providing services to over 200 cities in 90 countries. As the only data centre in Alberta with CloudFlare presence, DataHive clients receive continuous monitoring of emerging threats. When a new vulnerability is discovered, CloudFlare immediately creates new ‘rules’ that are automatically applied to protect your website.

Are you are a web developer dealing with Open Web Application Security Project (OWASP) rules? While client-specific rules are important, they do not offer enough protection without Cloudflare’s automatic WAF rule updates.

CloudFlare WAF bundles with Distributed Denial of Service (DDoS) protection to provide another layer of protection.

Also see: Certified Ethical Hacker (CEH)

Anyone who uses public Wi-Fi is at risk of a hacker viewing his or her online activity. Even wired connections can be tapped. Once your communication is intercepted, hackers gain access to critical systems such as your file server, databases, email and even online banking.

One of the smartest ways to protect your company data is through a Virtual Private Network (VPN). By using strong encryption, a VPN allows you to send and receive data as it travels across public, untrusted links, allowing the creation of a virtual private line between two points anywhere in the world. This keeps online traffic safe from prying eyes and tampering while providing the convenience that comes with a direct connection. Implementing a VPN allows employees and branch offices access to information that would otherwise be inaccessible due to technological obstacles. VPN provides security while removing some of these connectivity obstacles.

Two general categories of VPNs are site-to-site and dial-up.

Site-to-site VPNs protect office communication without requiring installation of costly dedicated fibre lines. This is ideal for connecting a branch office to a head office. The implementation involves installation of special hardware or virtual appliance at each location.

Dial-up VPNs, also known as road-warrior VPNs, are typically used for employees to access their head office when working remotely. It can also be used as a method for IT staff to securely manage data centre devices without exposing vulnerable management interface on the Internet. The implementation consists of the installation of a single VPN server and installation of VPN software on the connecting devices.

DataHive can recommend, design, implement and manage all types of VPNs to ensure your business communication is always protected. DataHive has implemented VPN solutions for the most challenging environments, ranging from protecting communication between China and Canada to reliably interconnecting to 3rd party VPN networks.

Also see: Certified Ethical Hacker (CEH)

What is Denial of Service (DoS)?

A Denial of Service (DoS) attack occurs when an unknown source causes a server or system to be overloaded with unauthorized data, causing legitimate use to be denied. DoS attacks negatively affect your customer satisfaction, revenue, and brand.

What is Distributed Denial of Service (DDoS)?

A Distributed Denial of Service DDoS attack is very similar to DoS, but more damaging and difficult to stop. Just like DoS, DDoS floods your website with fake traffic, except that with DDoS the attack isn’t coming from a single source, it’s coming from thousands, sometimes even millions of sources simultaneously. This makes DDoS mitigation more difficult because it’s even harder to separate real traffic from fake traffic.

Why Choose CloudFlare’s DDoS Protection through DataHive?

To combat attacks and stay online, you need a solution that’s resilient, scalable, and intelligent. DataHive has partnered with CloudFlare to deliver the best in DDoS protection. As the only data centre in Alberta where CloudFlare has a presence, clients enjoy in-house cyber security experts to assist you with protection setup.

Also see: Certified Ethical Hacker (CEH)