Pritesh Ganatra

British Technology Solutions

Your technology problem solver ...

About The Security Of Your Core Business Network

Pritesh Ganatra

CREATED BY PRITESH GANATRA

Published: 03/06/2025 @ 09:00AM
#TelecomTechnology #MorseCode #CopperWires #CommunicationRevolution #TelegraphHistory

The roots of technology, especially in the telecommunications industry, go back to 1837 with the introduction of the Morse code telegraph over copper wires. Prior to that, a written message would need to be handed to a horseman who would dash across the countryside ...

Securing your business network, Shielding from all harm, Peace of mind prevails

Securing your business network, Shielding from all harm, Peace of mind prevails

On a personal level, I haven't been involved that long, as I joined the industry in 1993 selling early Intel 286-based Amstrad computers and the original brick-like mobile phones. It really was a brave new world and set the foundations for a long and distinguished career.

I recently had the pleasure of visiting Adastral
Park in Martlesham!

It's the home to BT's world-famous Research, Invention, Innovation and Development Centre where services such as fibre optics and holographic technologies were developed and brought to the world. My visit was organised by The Institute of Telecommunications Professionals (ITP) to understand how BT is tackling Cyber Security.

For the past decade, cybercrime has become the number one threat to businesses, and it has been the job of either outsourced IT companies or internal IT directors/managers to secure data networks through the correct configuration of routers, managed switches and firewalls.

Controlling the deployment of more and more IP-based equipment like phones, Wi-Fi, CCTV, and IoT devices that are constantly connected has escalated matters where there is an increased danger that the ports on a router or passwords on connected devices need to be triple-secured.

Done correctly, nothing externally can ping your devices looking for a route into your network. So, my trip to Martlesham labs was to see and hear what BT, being the UK's largest infrastructure and Internet provider in the UK, are doing about stopping or limiting the number of cyber attacks from within their core internet network so that hackers can't get through to your networks in the first instance.

For starters, the cyber research team are deploying a wide range of software solutions and vast amounts of data processing to look for millions of dodgy domain names and weed these out for the legitimate ones. Unfortunately, this is an unregulated market, and hackers (as well as everyday people) can register a domain in about a minute! Domain name spoofing is also a tactic used by hackers to try and redirect you to an illegal website.

Would you spot the difference between Google.com and Gooogle.com if you were clicking a link in an email? Domain names are the foundation of email addresses and quite literally billions of emails are sent and received daily.

Using email security software does help with damage limitation, but again, ISPs such as BT need to somehow curb the flow of attacks by building up databases of IP addresses, spoof email and domain names so as to prevent hackers from passing the core networks.

It is an arduous task!

My trip to Martlesham was certainly eye-opening, so for now, I strongly recommend you get your business defences in order and ask your internal or external IT department to lock down networks and batten down the hatches as much as possible.

It's always better to be safe than sorry.

Until next time ...

PRITESH GANATRA

Your technology problem solver

Would you like to know more?

If anything I've written in this blog post resonates with you and you'd like to discover more about security for your networks, give me a call on 01604 926100 or take a look at my website, which you can find by clicking here.

Share the blog love ...

Share this to FacebookBuffer
Share this to FacebookFacebook
Share this to TwitterTwitter
Share this to Linkedin (popup window)Linkedin
Share this to Pinterest (popup window)Pinterest
Share this to WhatsApp (popup window)WhatsApp

#TelecomTechnology #MorseCode #CopperWires #CommunicationRevolution #TelegraphHistory

About Pritesh Ganatra ...

Pritesh Ganatra 

The word 'Technology' has too many connotations in today's world! Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT). Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.

BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.

I am your technology problem solver and I look forward to helping you.

More blog posts for you to enjoy ...

Click here to view this blog post


Fraud, Fraud, Fraud! What's The Cost To Your Business?

Did you know that small and medium-sized enterprises (SMEs) account for 99.9% of the businesses in the UK? At the start of 2023, there were estimated to be 5.6 million private-sector businesses ......

Click here to view this blog post


What's Your Back Up Strategy?

Here is the irony of the situation. It was inevitable that it would happen one day; that I would be caught out on the very thing I always preach to my clients. In two words: data backup ......

Click here to view this blog post


What is Email Security, And Why Do You Need To Be Really Careful About It?

Did you know that emails can be intercepted and the contents manipulated, modified and forwarded back to the intended recipient without you even knowing about it? Sounds frightening, doesn't it?...

Click here to view this blog post


The Essential Role of Two Factor Authentication in Preventing Hacking Attacks

In our digital age, safeguarding personal information is crucial. Two Factor Authentication (2FA) stands out as a vital security measure, offering a robust layer of protection against hacking. By requiring an additional piece...

Click here to view this blog post


Riding the Crest of the Wave Part 3 and the Big Copper Switch-off Approaches

And all of a sudden, we had Blackberry dominating the Global market. Watch the 2023 documentary of the Rise and Fall of one of the most secure email systems in the world, which is no longer with us in the handset market ......

Click here to view this blog post


Riding The Crest Of The Wave Part 2 And The Rise of the Internet

In 1997, the showrooms were closed and I went into the business call centre. The first dial-up disks were beginning to emerge that allowed customers to have a BTconnect (later BTinternet) email address. So, the Internet was b...

Click here to view this blog post


Riding The Crest Of The Wave. Part 1 sees me Starting out at Dixons in Oxford

It's November 1990, and I am a fresh-faced salesman working in the flagship Dixons store at the Clarendon Centre in Oxford. Only having been there about two months, I was thrown into the deep end as it was the run-up to Chris...

Click here to view this blog post


Technology Vs Humans: Who Is Right Or Wrong? Part 2

Supercomputers have been around since the 1950s and have assisted in historic moments such as helping to compute the complex calculations of sending a manned spacecraft to the moon ......

Other bloggers you may like ...

Click here to view this blog post


Time for a bit of coding, m'thinks; the YourPCM feature request list is calling!

Posted by Steffi Lewis on https://www.steffilewis.com

Apart from a few small tweaks to sBlogIt! recently, I haven't really engaged with coding for the past few months. Even as someone whose entire purpose ...

Click here to view this blog post


Are You Really Calling the Shots in Your Career? Here's How to Take Control

Posted by Dave Cordle on https://blog.davecordle.co.uk

Who is calling the shots in your career? If you feel like you're simply drifting along with someone else's agenda, it's time to take a more intentiona ...

Click here to view this blog post


Understanding Changes to Winter Fuel Payments: Recovery Through the Tax System

Posted by Roger Eddowes on https://blog.essendonaccounts.co.uk

The government has decided to implement a recovery system for winter fuel payments through HMRC for pensioners with incomes exceeding £35,000. I'm goi ...

Click here to view this blog post


How Trigger Words And Images Can Get You More Referrals

Posted by Jacky Sherman on https://www.jackysherman.com

This blog is about how Helen Beaumont of Essendon Tax focuses her network and messages to stimulate more referrals to her ideal clients. I spoke to he ...