Cambium Networks – The Wireless LAN Go-To

Camp Bucca Flag presented to namesake's family

Considering their years of experience, it’s a given that the team at the Network Department is familiar with the application and installation of a wide variety of manufactures’ wireless LAN and WAN products. Even so … they do have their go-to devices based on reliability , scalability, and the ROI the devices provide the customer. The go-to company for internal and external access points and accessories for wireless LAN networks is Cambium Networks. Here’s why …

Cambium Networks is a leading global provider of wireless broadband solutions that connect people, places and things. The company’s sizable product line includes reliable, scalable and secure WiFi products, as well as fixed wireless Cambium_Networks_Point_to_Multi_Point_Subscriber_Modulebroadband point-to-point (PTP) and point-to-multi-point (PMP) platforms
managed by cloud-based software. Through this extensive portfolio Cambium Networks makes it possible for public safety networks to build
powerful communications networks, reach users and intelligently manage their infrastructure.

Cambium Networks builds quality in through design, manufacturing, testing, partner selection, and support. Customers choose Cambium Networks solutions
over other systems because they “just work” the first time – and don’t stop. The company’s Point to Point Networking and Point to Multi-point solutions
offer scalable, high speed, secure networking solutions that are used the world over.

Add to all of the above multiple levels of support, the option of extended warranties, and an easily navigable website, and it’s easy to understand why Cambium is a favorite.

Here’s what they have to say on product quality: Cambium Networks Quality Video

What’s best for your organization?  Let the team at 2-Way’s Network Division help create and execute a road map for the IT solution that’s best for your business. Give them a call (603-431-6288) or send an email to NetworkSolutions@2-way.biz.

Cell Number Security

cyber-crime

Digital privacy goes hand-in-hand with digital security … and there’s an increasingly-used piece of information which you control which the bad guys are after … it’s your cell phone number. More and more they are being used by the bad guys as a way to personal information that’s kept by nearly all corporations, financial institutions, and, yes, social media networks.

Your cell phone number is a gateway to your identity. It provides an entrance to all the data contained on your phone, and can connect your other information to you – your email address, physical address—everything. In a company’s database, your phone number becomes another piece of personally identifying data. But unlike our Social Security numbers, the number is not regulated, and no companies are mandated to keep it private.

Mobile phone numbers them become a target for attackers. Most of us have gotten wise to phishing and email breaches. Now there is SMiShing (pronounced “smishing”) … the act of sending a text message containing questionable links to harmful websites. Once the bad guys get your credentials, they can log into your banking site as you. Then, we all know what can be done: Monies transferred. Checks written. Stocks sold.

Even seemingly innocuous requests like the one from a sales clerk can lead to trouble. The fact that they now have it means it could be hacked. Customer phone numbers have been stolen from Anthem, Citigroup, JPMorgan Chase, Walgreens, and Yahoo.  

What you can do: 

  1. Use common sense: If you’re asked for your phone number, ask why.
  2. Get a virtual phone number: Google Voice gives you a free phone number for calling, text messaging, and voicemail. It works on smartphones and computers, and syncs across your devices so you can use the app while on the go or at home. Check out https://voice.google.com
  3. Enable two-factor or multi-factor authentication on all your devices:
  4. Sign up for the “do not call” lists, which are helpful for run-of-the-mill solicitations.
  5. Choose which private data you are willing to share: Maybe an email address, zip code or just your name as a way to identify you. It’s worth asking about with the person asking for data.

The Network Division is Hiring

Network_Car

Lyle has an opening in the Network Division for a PC & Server Technician/Consultant. It’s a great opportunity for personal and professional growth … and some fun besides (have you ever heard about the company’s annual holiday party?). I asked Lyle what he was looking for in a candidate. Here is his response:

2-Way Communications Service, Inc’s Network Division is looking for a full time PC & Server Technician/Consultant for the Southern NH and ME area. Professional attitude, appearance, and the desire to learn required. Think of a “techy” Errol Flynn with the learning capacity of Neil deGrasse Tyson.

A variety of tasks like running cable, scripting server management, configuring active directory, cleaning virus infested pc’s, upgrading server OS’s, designing wireless LAN’s, documenting network configurations, installing and configuring IP-based surveillance systems,  etc. will keep the person in this position learning and moving every day. Our technicians regularly rescue office managers in distress, defend the downtrodden, and in general save the day.  Current Microsoft Certifications desired.

You will join a small team working hard to support dozens of companies and government agencies with dozens of servers and hundreds of pc’s. Roughly half of your time will be spent in the office providing remote support over the phone and using remote management software. The other half will be spent at customer locations fixing, uploading, installing, and other similar tasks. Given the fact that much of our client base is law enforcement you will be subject to a criminal background check and squinty-eyed scrutiny every time you enter an office.  

Applicants must meet all of the requirements below plus 3 others which are secret but may be waived if we hit the golden buzzer during an interview:

  • Have excellent written and verbal skills. 
  • Have a good sense of humor. 
  • Have experience with current Windows Server operating systems. 
  • Be self-motivated with a strong desire for professional growth. 
  • Be on time; I mean really, how hard is it to leave a few minutes early in case there’s traffic? 
  • Have an appreciation of eclectic musical tastes (It’s my office. Enough said.) 
  • Understand Ethernet networking and basic routing. 
  • Be available for occasional night and weekend work.

If you are interested in applying for this position send your cover letter and resume to networksolutions@2-way.biz. Thank you!

 

Lenovo ThinkPads and MIL-SPEC Testing

download01

I get to see a bit of the outdoors as a normal part of my work day. I take all of my gear with me simply because you never know what you might need. That includes my Lenovo ThinkPad, usually slipped into a sleeve in my daypack along with camera and sound gear, food, drink, and the rest. When the Network guys gave me the lightweight, dainty-looking device I carry, I thought I’d be asking for something more rugged in short order. That hasn’t happened, and I think it’s all because of the military specifications the ThinkPads meet.

download02

MIL-SPEC is a set of standards designed to test durability, ruggedness and reliability. These tests cover extreme environmental variables including temperature, pressure, dust, humidity and vibration. Although ThinkPads have always been known for their robustness, they were not specifically designed to only meet the MIL-SPEC 810G standard. Meeting the 810G standard is only part of ThinkPad’s durability, robustness and reliability. Selected ThinkPad models, including all X & T series, have successfully passed the following tests:

HUMIDITY: 91-98%
Subjected to 91-98% humidity at 20°C to 60°C (68 – 140° F)

LOW TEMPERATURE: -20°C
Frozen at -20°C (-4°F)for over 72 hours

HIGH TEMPERATURE: 30°-60°C
+30°C to +60°C (86°F to 140°F) over 7 x 24 hour cycles

SAND TEST: x6 HOUR CYCLES
Subjected to 140 mesh silica dust for 6 hour cycles

HIGH VIBRATION: MULTIPLE TESTS
Undergoes multiple tests while switched on and off

MECHANICAL SHOCK: x18 TIMES
High acceleration and repeated shock pulses over 18 times

HIGH ALTITUDE: 15,000ft
Tests operation at 15,000 feet while running

TEMPERATURE SHOCK: -20°C – +60°C
Performs in temperatures oscillating between -20°C and +60°C (-4°F and +140°F)over 3 cycles of 2 hour duration

download03

Take a look at what Lenovo has to say about the durability of their products.

If you’d like to learn more about Lenovo business products, call the Network Division at 2-Way Communications Services (800-441-6288 x 1746) or send an email to Networksolutions@2-way.biz . They’ll be glad to help you find a workable, sustainable solution that’s right for your business.

Cloud Services

 

Cloud_Computing

The Network Division utilizes the Cloud when it is the best solution.  For many things Cloud solutions are wonderful, but for many they are not.

If you need rapid scaling and geographical diversity, the cloud may be the way to go.  But remember, the cloud is really just someone else’s server, it’s not magic!

Cloud-based solutions provide:

  1. Redundancy – When there is a hardware (RAM, CPU, motherboard etc.) failure in a server, it will route traffic to a backup server.
  2. Scalability – In Cloud servers, you can increase/decrease resources (RAM, CPU, storage etc.) anytime as you see fit.
  3. 100% Uptime – Whatever application, files, images, videos are there on the Cloud, they’re all accessible all the time.
  4. Hosting – Your business website needs to be stored somewhere and be accessible to other computers. Hosting allows you to use another’s rack space to accomplish this.

 

The benefits for business are:

 

  1. Data protection
  2. Regulatory compliance and data residency requirements
  3. Scalability and flexibility
  4. Cost efficiencies
  5. Access to data anytime, anywhere.

 

Sometimes cloud solutions are not the way. Depending on your company’s requirements, you may notice connection issues or network latency. Additionally, given enough operating capital, you may be able to save your business a lot of money down the road by creating your own business network.

What’s best for your organization?  Let the team at 2-Way’s Network Division help create and execute a road map for the IT solution that’s best for your business. Give them a call (603-431-6288) or send an email to NetworkSolutions@2-way.biz.

SAU17 Surveillance Upgrade

Hikvision

The Network Division of 2-Way Communications is assisting Sanborn Regional School District with a surveillance system upgrade.

The district is composed of two elementary schools, a middle school, and a high school. The objective of the project is to expand the current surveillance system by replacing old and installing new surveillance cameras along with supporting hardware and software.

Over the past four weeks 2-Way teams have pulled approximately 20,000 feet of cable throughout the four schools in preparation for the camera install. Within the next four weeks approximately 100 new cameras will be mounted and hardwired to recorders. The project is scheduled to be completed before the new school year begins.

As noted above, the camera installation process has begun. Here’s Chuck doing some high work …Chuck_Surveillance

Stay tuned ….. there’s more to come …

Achievable Security

cyber-crime

Personal on-line security is obviously  needed, and I’m sure you’ve been meaning to clean up some things up for awhile. On a daily basis spamming, phishing, man-in-the-middle attacks, and ransom ware pose serious threats. Passwords continue to leak in rather large corporate breaches, and people own more and more devices that can be compromised. Do you sometimes feel like you’re tightrope walking without a net?

The overwhelming challenge of protecting yourself is only apparent, and is not reason to give up on security. It’s true that adding more internet security does require some work. Note the operational term here is “some”. It’s a relative word. So do it!

The first step is to check off the really simple tasks that only take a few minutes, noted in a prior blog post. Once you’ve got that baseline set, read on for the slightly more time-consuming tasks. Do one, do all … Do it for yourself, then generate some positive personal karma and do it for your relatives or a friend, too.

Set Up a Password Manager

The nice thing about setting up a password manager is that once you put in the time to get it up and running it will genuinely make your life easier beyond just improving your security. You won’t have to go through password resets all the time, risk being locked out of accounts after too many failed entry attempts, or need to stretch your brain with complicated password mnemonics. Everything will just be there behind one long and strong master password. Once you get going it easily becomes part of the daily routine, and you’ll eventually you’ll wake up one morning and realize that you’ve had your password manager for years. Promise!

Enable Two-Factor Authentication

This measure, which usually requires you to enter temporary codes sent to or generated on your phone along with your regular password, helps protect you from attack if your passwords fail. Not all services have two-factor authentication, and many that do call it by similar but confusing names. Setting it up for important accounts, though, provides another defense layer.

Make Backups

This is such an obviously great idea that the point will not be belabored here. Whether you’re storing backups locally on a hard drive or in the cloud, you can add an additional layer of protection by encrypting your data and password protecting it before doing the backup. With this in place your data has increased defense even if your cloud provider is hacked or your external hard drive is lost/stolen.

Know How to Use a VPN

Once you are connected to the internet, VPNs create an encrypted connection between your device and a secure server. With this connection in place you can browse and use the internet, protected from eavesdropping. All you need to do to use the VPN day to day is log in through a “VPN client,” an application or web portal. If you’re doing something sensitive or browsing on unprotected public Wi-Fi, like at a coffee shop, turning on your VPN helps ensure that the data you send and receive is encrypted and can’t be spied on.

Use End-to-End Encrypted Chat App

Apps with full end-to-end encryption are safe from prying eyes, whomever they may be. By convincing your friends and family to switch to chat apps like WhatsApp and Signal, you reduce the chance that your communications will be intercepted. As with password managers or anything else, there is never a guarantee of perfect security, but taking the step to use services that place a high priority on security is better than not doing it.

For the average person who’s just looking to make some positive changes, adding these five precautions to your digital life will make a significant difference in the quality of your defense, and your ability to recover from common attacks.

Watch a Google video: Does two-factor authentication protect me from hackers?

The 3CX Phone System

Small-business-phone-systemThe 3CX Phone System for Windows is a software based phone system for Windows that works with a wide array of phones, SIP trunks and VoIP Gateways to provide a full PBX solution. It does so without the inflated cost and management headaches of an ‘old style’ PBX.

3CX includes clients for smartphones and laptops that allow employees to use their office extension from anywhere, making it seem as if they were in the office. Not only are all calls to the office free of charge, but employees can leverage one single number and make a professional impression.

Because 3CX runs on Windows, it is easily installed and managed. It’s preconfigured to work with popular IP Phones, VoIP Gateways and SIP trunks, so no hassle of having to configure and manage those devices.
With 3CX, companies can reduce their telephone costs by up to 80%. With the CRM integration agents get a customer name rather than a number, and the ability to make outbound calls from a CRM customer page.

To summarize, with 3CX, you can:

Take your extension everywhere you go
All calls are free of charge – slash your mobile phone bills
Increase productivity – work from anywhere
Know who’s calling with CRM integration – increase customer satisfaction

Contact 2-way Communications Services Network Division for more information, or to set up a free trial. Give them a call (603-431-6288) or send an email to NetworkSolutions@2-way.biz.

Remote Managed Service

network_rms

Maybe it’s the sometimes rude, hard-to-understand IT support guy. Maybe it’s the variable costs associated with a break-fix support model. Maybe your IT guy closed his doors and just disappeared.

Working with local Seacoast companies and town offices, we understand your day-to-day operations provide enough of a challenge. You don’t have time to deal with these scenarios. We can help – our customers spend more time on core business and 20 – 45% less on IT costs.

Chris

A managed services provider (MSP) offers management and support of IT network-based services, applications and equipment. A reliable MSP allows business owners and employees to focus on their core functions and not spend valuable time trying to learn enough to take the place of an IT professional.

The Network Division of 2-Way Communications Service provides proactive IT managed services using a remote monitoring and management (RMM) system. This platform allows us to continually monitor the health and performance of your IT network—without any kind of disruption to your employees’ activities.

 

Our robust RMM platform supports early detection and remediation of issues before they cause downtime or data loss. We will also generate regular reports that provide insight into your IT system, including the business value and services being received, which will help you plan and budget for future IT expenses.

Remote monitoring and management works because an RMM tool conducts oversight of your network and IT assets 24/7. When necessary the RMM tool alerts your MSP to a potential issue or an issue about to occur; a centralized dashboard allows for remote diagnosis and remediation of the issue by the appropriate technician—without disruption to your business flow!

You can trust us to deliver the level of managed services your business needs to ensure a stable and secure IT environment. Our proactive services model will eliminate business disruptions and give you peace of mind knowing that your networks are always secure and operational with no surprises or unexpected expenses.

Is it time to get back to business and let an experienced team take care of your IT? Call the Network Division at 2-Way Communications Services (800-441-6288 x 1746) or send an email to Networksolutions@2-way.biz .  They’ll help you develop, implement, and execute a plan that best fits your company’s needs.

Josh

Steganography 101

images

Steganography is the practice of hiding secret messages in otherwise non-secret mediums. It has been used in various ways for years – writing Revolutionary War messages in invisible ink, as an example. In the digital world, even something as benign as an image may be stealthily encoded with information. As an example, the pixel values, brightness, and filter settings can be manipulated by a hacker using a secret code to embed a message.

Through this technique hackers are deceiving internet users and smuggling malicious payloads past security scanners and firewalls. Steganography’s goal is to hide the fact that the content exists at all by embedding it in something else. The hidden code can then be used in all sorts of malicious attacks.

Various reports indicate that steganography is being used more than ever … although it is possible that the good guys are just getting better at detecting it. Steganography is being detected not only in sophisticated hacks, but in the attacks of low-level cyber criminals as well: malvertising; phishing; and malware distribution. This may be in part to the sale of steganographic instructions, allowing the technique to trickle down to the bad guys who may not have thought of a particular attack.

For individuals and small businesses, the way to protect yourself from steganographic attacks is to continuously work on security overall. Whether a phishing or a malvertising attack incorporates steganography or not, it still requires you to click on a link or download a file. If you’re aware of these types of attacks, looking out for them, and securing your accounts with protections like two-factor authentication, you’ll reduce your risk and have defenses in place if you are attacked.

Overwhelming, isn’t it? The Network Division at 2-Way communications can help. We’ll provide you with the integrated Security Awareness Training and Simulated Phishing platform used by more than 8,000 customers nation-wide. Contact The Network Division for more information or to set an appointment today. Give them a call (603-431-6288) or send an email to NetworkSolutions@2-Way.biz.