Free delivery

McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams

Dynamic search > >
UK Sales: 0330 1340 230

Latest News

20/10/2021
by Paul Heritage

Check the latest blogs and updates from SonicWall-Sales.com

Four Cybersecurity Actions to Lock it All Down

20/05/2022
by Paul Heritage

Recognizing 2022 World Password Day, here are four countermeasures to keep you safe from malware and ransomware. Time to level up!

You are not paranoid; cybercriminals really are trying to hack your security and steal your information. And the proof is in the numbers.

According to the 2022 SonicWall Cyber Threat Report, there were 623 million ransomware attacks globally, a 105% increase over 2020. There was also a sharp triple-digit increase in encrypted threats, rising to an astounding 10 million attacks. And as if you didn’t have enough to worry about, cryptojacking is on an upswing with 97 million incidents recorded, a 19% increase year-over-year.

Some people may choose to ignore the data and throw caution to the wind. If they’re lucky, a hack will be a minor inconvenience, and their anti-virus software will stop the malware before it can cause serious damage. However, if they’re among the growing thousands of victims each year, hackers will force them to pay a ransom for their precious data, steal their identity or just wipe out their devices completely.

And you wonder, what could be worse?

One hack of a single individual can lead to a cascade of hacks and much larger problems. For instance, hackers can break into your personal computer without you knowing it, add malware to one of your devices that unpacks wherever you go, bypassing firewalls and other security, straight into your home network, friend’s home, the library, and your workplace.

We all could stand to be a little more careful. A “cybersecure mindset” protects you, your devices, and your data and everywhere you connect your devices. So, when we say, “Be Cyber Smart and Lock It Down,” what we mean is taking personal responsibility for not only how you connect but also actions you take to keep yourself secure.

Here are FOUR COUNTERMEASURES that everyone can use to level up and lock it down:

1. PROTECT yourself.

Start with passwords and lockdown your devices, software and information with strong ones that protect you from becoming an easy hack. There are some basic rules for good passwords. The first is the length – a minimum of 14 characters but 16 is better, with a mix of uppercase and lowercase letters, plus numbers: security experts recommend at least 4 non-repeating numbers. And don’t forget symbols (ex: @ # $), at least one but two is better. Check with your service provider; they may have specific requirements like the length and number, and type of symbols. One very important rule: ensure that your passwords are unique for each use. Avoid obvious sources like your address, recognizable names, dates, and phone numbers. Avoid any information that someone may learn by reading your social media profiles. Another important rule, USE YOUR PASSWORDS and turn on two-step authentication (2FA) wherever you can. Many phones allow biometric recognition to validate you and simplify logging in for each access. There’s more to know about passwords, check out this article we found from Help Net Security.

2. PROTECT your personal identification.

Privacy is a matter of personal choice. We want to open some things for the sake of convenience (shopping and health apps, for instance). However, the privacy settings you set on your devices and apps could also open you up to hacks. Being “smart” about your cybersecurity means knowing how hackers attack devices and steal information from open apps. It also means being aware of where your personal information winds up. Security experts recommend that you set your privacy settings based on actual need for specific tasks. For instance, change your privacy settings when conditions change, like when traveling or using public networks (e.g., coffee shop Wi-Fi, more on that later).

3. PROTECT your data.

Maybe it seems obvious, but your data (photos, reports, accounting, proprietary documents) are your most vulnerable possessions. We also want to take extra care of our social security numbers, bank accounts, and credit card numbers. And all of that is at risk when we leave it in open apps (no password) or send it on unencrypted emails. So please keep it safe and LOCK IT DOWN! And be very wary of phishing campaigns. Hackers use any means they can to break into your devices and network. For example, they’ll spoof organizations you trust, friends, family members, co-workers, or even your boss. Phishing messages can come by email or phone text. Some of these messages look very authentic. We’ll go into more detail about how to detect phishing messages in another post, but you can make a personal policy to never share private information via email or text with anyone.

4. PROTECT your devices.

If you didn’t know already, public Wi-Fi hotspots are not secure. Unfortunately, that means the public hotspots at your favourite coffee shop, restaurants, shopping malls, libraries, and especially airports. With minimal knowledge and equipment, hackers can scan unencrypted data streams that contain passwords and account information that you send and receive. Several years ago, scammers took it further and created elaborate spoof Wi-Fi networks with name and branding marks similar to what people expected. However, there are several things you can do to lock it down:

  • Turn off the Wi-Fi auto-connect feature on your devices. Turn it back on when you need it and choose the networks you want to use.
  • Use secure wireless networks that have WPA or WPA2 password protection. Unfortunately, these are uncommon for places like the local coffee shop or the airport, so they may be challenging to find.
  • Install mobile security software with malware and virus detection for laptops, pads, and phones. You may also install a VPN (a virtual private network) that encrypts your data stream even if the Wi-Fi network does not.

Do what it takes to adopt a Cybersecure Mindset.

Remember that when it comes to cybersecurity, the human element can be the strongest or weakest point in the armor.

Human behavior is without doubt the biggest culprit in IT security incidents. This is evident in email phishing. It deceives people into clicking on malicious links or attachments. This makes it difficult to distinguish between legitimate emails and potential threats. According to a study by Myers-Briggs, a research company based in the UK, 80% of companies believe human factors, such as mistakes or leniency with login security, are a major cause of cybersecurity risk. Therefore, it is vital that we do what it takes to adopt a ‘cybersecure mindset’ to protect our homes, communities and our workplaces.

Being aware is not being paranoid; it recognizes that cybercriminals really are trying to hack our security, steal our property, and do us great damage.

#BeCyberSmart

SonicWall Global VPN Client (GVC) Update

28/04/2022
by Paul Heritage

SonicWall PSIRT has worked with engineering and product teams to confirm and correct three vulnerabilities associated with the SonicWall Global VPN Client (GVC), two of which impact the included client installer. Successful exploitation via a privileged user could potentially result in command execution in the target system.

IMPORTANT: There is no evidence that these vulnerabilities are being exploited in the wild. The three vulnerabilities can only be exploited after the adversary gains control of the machine, has admin privilege or is able to place malicious files on the machine.

SonicWall strongly urges that organizations using 32- and 64-bit GVC versions in their networks carefully review the knowledge base (KB) article and follow guidance for upgrade.

OVERVIEW

Advisory ID: SNWLID-2021-0036

Product(s): SonicWall Global VPN Client (GVC)

Issue: GVC DLL Search Order Hijacking

CVSS: 7.7 (High)

Impacted Version(s): GVC 4.10.7.1117 and earlier (32- & 64-bit version)

Fixed Version(s): GVC 4.10.7.1424 (32- & 64-bit version)

Notes: There are different mitigation steps for 32- and 64-bit GVC versions. Please read the KB article carefully to resolve issues to your specific version.

READ SUPPORT ADVISORY

IMPORTANT: Adhering to industry best practices, SonicWall does not provide support (e.g., technical support, firmware updates/upgrades, hardware replacements) for products that have reached End-of-Support (EOS) status. View the SonicWall Product Lifecycle Table for more information.

Read it Now — 2022 SonicWall Cyber Threat Report

17/02/2022
by Paul Heritage

Introduction: 2021: A Turning Point in the War on Ransomware

Five years ago, a debate erupted surrounding the infamous NotPetya cyberattack: Did it constitute an act of war?

This issue continued to be debated in the courts throughout 2021, but on the battlefields of business networks around the world, cybercriminals were launching a full-bore offensive.

Ransomware climbed an unprecedented 105% in 2021, and the explosive growth of strategies such as double and even triple extortion ensured that these attacks were more successful than ever. But as cybercriminals have grown more sophisticated and successful, they’ve also grown more ruthless — many of the high-profile ransomware attacks in 2021 looked more like acts of war than ever before, endangering our food supply, our water supply, our fuel supply, our hospitals and our municipalities.

That the courts ultimately decided cyberattacks such as NotPetya do not, in fact, constitute acts of war is irrelevant: Fed up with cybercriminals growing rich off their constituents, leaders around the world — from the local level to the international stage — have brought the war to them.

The UN Cybersecurity Open-Ended Working Group in March 2021 endorsed a report containing cybersecurity recommendations, the first time that a process open to all countries has resulted in consensus on international cybersecurity.

In May 2021, U.S. President Joe Biden issued a sweeping executive order on cybersecurity, which unifies cybersecurity standards across government agencies, emphasizes zero-trust principles and provides specific timelines for action.

In July, INTERPOL held its forum on ransomware. Advising that effectively preventing and disrupting ransomware would require “adopting the same international collaboration used to fight terrorism, human trafficking or mafia groups,” the group called for police agencies worldwide to form a global coalition with industry partners to stop ransomware’s exponential growth.

But perhaps the biggest testament to the threat ransomware poses to national security is the involvement of the U.S. military. In an interview with The New York Times, U.S. Cyber Command head Gen. Paul M. Nakasone explained that, while he once saw ransomware as the responsibility of law enforcement, attacks such as Colonial Pipeline and JBS represented a big enough threat to the nation’s critical infrastructure to warrant a more aggressive approach.

But this approach likely won’t include boots on the ground — an option that proves challenging given that a vast majority of these ransomware operators are in other countries, most of which are not U.S. allies and tend to only go after cybercriminals when it serves their agenda.

While high-profile arrests of cybercriminals continue, such as the REvil takedown in early 2022, they have been largely ineffective in stemming the tide of ransomware itself. The amount of time and resources required for each bust means that the criminal justice system is unable to keep up with the huge number of ransomware operators. And due to the lucrative nature of ransomware, as soon as one group is taken down, new ones rise to fill the void.

Instead, this approach will look a lot like their most ruthless attacks on civilians: a direct assault on their infrastructure. Pressure on the U.S. government to deploy intelligence and military solutions to attack the servers, networks and more used for cybercrime, dissemination of stolen data on the dark web and storing cryptocurrency payments is growing.

While he refrained from giving details, Nakasone confirmed that the military has taken an offensive stance against ransomware groups. One known example is when Cyber Command assisted in the recovery of millions in ransom that Colonial Pipeline paid to attackers.

Though recoveries such as this have historically been rare, this may be the first in an emerging trend. A major factor credited in this recovery is the work of a recently formed Ransomware and Digital Extortion Task Force. In an interview with Reuters, a senior U.S. DOJ official said the formation of this task force “elevates investigations of ransomware attacks to a similar priority as terrorism.”

As the amount of media attention and government involvement in the wake of high-profile attacks increases, these groups have grown wary, with many laying low or disappearing altogether. This could lead to groups lowering ransom demands in hopes of flying under the radar and continuing to hack another day — which could contribute to fewer attacks if success no longer means netting a life-changing fortune for the entire syndicate.

In other words, in the end, the most lethal shots to ransomware may well be the ones that hit where it hurts most: the wallet.


Read the full 66 page report here: https://www.sonicwall.com/medialibrary/en/white-pa...

The logic of using three random words for strong passwords and why the NCSC advises the approach.

07/02/2022
by Paul Heritage
  • National Cyber Security Centre (NCSC) explains the logic behind its long-standing password advice for the first time
  • Using three random words is more secure than traditional advice built around ‘password complexity’, experts argue
  • Approach allows creation of passwords to ‘keep the bad guys out’ whilst remaining easy to remember

Cyber security experts have today (Friday) revealed in depth for the first time the logic behind their advice to use three random words when creating passwords.

In a new blog post, experts at the National Cyber Security Centre (NCSC) – which is a part of GCHQ – said a key reason for using three random words is they create a password which is easy to remember and strong enough to keep online accounts secure from cyber criminals.

The blog post noted that using three random words to coin a password is more effective than traditional advice to create complex passwords, which can be difficult to remember and yet guessable for criminals.

Other reasons for choosing the three random words approach were:

  • Length. Passwords made from multiple words will generally be longer than passwords made from a single word and therefore meet minimum length requirements.
  • Impact. 'Three random words' contains all the essential information in the title, and can be quickly explained, even to those who don't consider themselves computer experts.
  • Novelty. A password containing multiple words encourages a range of passwords that have not previously been considered.
  • Usability. It’s easier for users to enter a three random word password than one which contains a complex range of characters.

NCSC Technical Director Dr Ian Levy, said:

“Traditional password advice telling us to remember multiple complex passwords is simply daft.

“There are several good reasons why we decided on the three random words approach – not least because they create passwords which are both strong and easier to remember.

“By following this advice, people will be much less vulnerable to cyber criminals, and I'd encourage people to think about the passwords they use on their important accounts, and consider a password manager.”

Rocio Concha, Which? Director of Policy and Advocacy, said:

“Ensuring you use strong yet memorable passwords online and with smart products is more important than ever – our research has repeatedly highlighted poor security practices in a range of connected devices, from routers and wireless cameras to apps.

“There’s a reason why new legislation announced by the government to improve standards for smart devices includes a ban on generic default passwords – these can make it easy for hackers to take control of devices or even your home network.

“Strong passwords can stop cyber criminals in their tracks, and we’d urge everyone to ensure they adopt good practice to safeguard their data and privacy.”

Creating passwords using three random words is one of the six key steps recommended by the cross government Cyber Aware campaign to protect accounts and devices from most cyber crime. More information can be found at cyberaware.gov.uk.

The importance of continuous security monitoring

23/12/2021
by Paul Heritage

No matter how complex, every business and network must be protected from vulnerabilities, cyber threats and attacks as soon as they occur, not minutes, hours, or days afterwards.

There are always new and evolving threats to networks, and often, many of these threats go unnoticed or undetected as hackers continue to try and insert destructive malware, attack system infrastructures and steal sensitive data.

However, with the right firewall and the implementation of continuous monitoring, businesses can be confident that their security levels remain high, and teams can act quickly when a threat is detected.

There is a vast range of types of firewalls currently on the market, and at www.sonicwall-sales.com/firewalls, you will find everything you need to know as well as a helpful team on hand to answer your questions.

The importance of continuous security monitoring

Vulnerability management

Continuous security monitoring is the ongoing monitoring of networks and checking their security status 24/7, identifying, evaluating, treating, and reporting network vulnerabilities.

With servers, desktops, cloud, virtual, and containerised assets needing to be scanned for vulnerabilities, security monitoring is required so actual or attempted security attacks are found, with appropriate processes in place to respond.

Ultimately continuous monitoring helps businesses manage risk better by:

  • Looking at the activity that could negatively impact your network assets and systems
  • Always monitoring threats
  • Reporting unnecessary exposure
  • Monitoring unauthorised changes and misconfigurations
  • Detecting security vulnerabilities
  • Providing you with compliance to industry standards and regulations
  • Identifying threats and missed security issues in set policies
  • Producing detailed reports
  • Providing policy documentation to meet compliance requirements
  • Recertifying all mandated firewall rules and configurations
  • Providing greater depth security intelligence.

Sonicwall firewalls matched with continuous processing delves into sets of rules, comparing these against any proposed changes to internal network and system checks.

All regulated businesses held to the standard must include continuous monitoring as part of their security processes.

Continuous monitoring best practices

Regulatory standards require constant compliance, which means you must continually check your systems for potential security threats – there is no network time off!

For businesses, continuous monitoring helps avoid data breaches, potential penalties, legal action, and even loss of reputation.

This is why maintaining visibility into network changes is essential—providing businesses with a greater understanding of what is happening to the network and why. Knowing, with confidence, that your data and intellectual property are safe, your security protocols are adequate, and your policies and processes can be followed and indeed work.

To help, some of the best practices you could implement into your processes include:

Risk assess your systems and data, adding values to assets that allow you to prioritise and quantify risk in a more manageable way, providing you with a clear picture of your network environment.

Choose the right security solution for your network and apply the right policies and processes that directly affect the identified risks.

Ensure that when you buy the SonicWall firewall, it integrates seamlessly with all vulnerability scanners and more.

Provide adequate controls that work with your security policies.

Continue to assess and review all controls to ensure 100% protection at all times.

Track all changes and any impact these changes may or may not have.

Maintain tight security controls to ensure full compliance with policies.

Look for collaboration and influence from peers and leadership teams, using a common language with shared objectives.

Integrate your vulnerability risk management processes with internal tools and processes so remediation efforts can seamlessly flow through all existing networks, finding and fixing vulnerabilities instantly.

The perfect solution

To provide you with the best visibility, security, and flexibility, look for a firewall solution that can offer you:

  • Real-time monitoring and security analysis
  • Policy search options
  • Traffic flow analysis (understand network behaviour and firewall policies)
  • Modelling and testing (impact of potential changes)
  • Customisable reporting – flexibility based on context
  • Collection of live vulnerability data from all identified endpoints.
  • Dynamic dashboards that showcase behaviour trends and allow you to track the progress of security programmes easily.
  • And so much more.

The focus is on making networks more secure in the moment, accessing actionable intelligence through continuous and historical data.

Continuous monitoring analyses millions of vulnerabilities in seconds so you can proactively secure your networks and make the best and informed decision for your security requirements.

Today, as working from home becomes more of the norm, it has become even more challenging for security teams to manage and control their networks, let alone defend them from attacks.

We need to understand risk at every level, understand the complete IT landscape and business environment, and have a clear picture of overall risk from existing to new assets joining the network.

Firewalls and security processes and policies should be reviewed regularly to ensure that they still provide the level of security required and that they meet the business’s needs.

To find the right firewall for you and your business’s network, call our team today on 0330 1340 230 or email enquiries@sonicwall-sales.com.

The Top Online Security Myths

16/12/2021
by Paul Heritage

While the internet offers us a wealth of incredible information and advice, you’ll find there are so many online security myths out there today. When you start to believe these myths, you put your business and systems at risk. Today we’re here to debunk some of the top myths our team of SonicWall Sales experts has seen over the years. We’ll put your mind at rest and help you find the best SonicWall firewall solution to fit your business needs.

The Top Online Security Myths

1. Small Businesses Won’t Be Attacked Online

The internet is a massive place, and no one is safe from hackers today. You might think that just because your company only has a few devices or you just work on your phone, you don’t need to protect yourself with a Sonic firewall. That’s not the case at all. Regardless of how many computers and pieces of software your business uses, you need to ensure you are protecting yourself from attacks. Each year, these attacks are getting more and more complex, meaning anyone is open to these issues. These hackers are becoming even more advanced, which is why you need to start protecting yourself now before it’s too late.

2. All You Need is a Firewall and Antivirus Software

Using SonicWall firewalls is one of the best ways to protect yourself from hackers and other issues. We also recommend looking into antivirus software to make it less likely for an intruder to access your system. However, that doesn’t mean you can do anything online and just have no concerns about security. As a business owner, we recommend that you make sure you keep your software up to date and educate your team about online security. So often, these attacks occur as a result of someone not understanding the risks involved with clicking links or opening attachments online. The more business online security you can offer your employees, the more you’ll protect your organisation in the future. On top of that, also think about endpoint protection if you have a lot of your team working from home still to protect your business wherever it’s operating from.

3. Mac vs Windows

When it comes to using different types of computers, most people naturally think that Apple products are completely protected from intruders. However, you’ll be surprised by how much risk is still out there for Mac users. While they are usually more secure than Windows devices, this doesn’t mean they are immune from any issues. You’ll find that as this type of device has become used more often, there is more risk for Apple users. This is one of the top cyber security myths and one you should keep in mind when purchasing new devices for your workplace in the future.

4. The Cloud is Too Risky for Businesses to Use

The cloud is one of the newer inventions that businesses are now relying on each day. We have started to hear more news stories about hacking in the cloud, but that doesn’t mean it isn’t a great option for your company. In fact, when you offer yourself the right protection, you’ll find that it’s a great way to store data away from your hardware. Make sure you compare cloud services before selecting the one that’s right for your company. For the most secure option, try and find one with a private server, which will offer you full security without sharing your server with anyone else. There are different options for any type of business, so research the solutions out there and discuss with our team how we can help you to protect yourself when working in the cloud.

5. Protecting Your Computer Will Slow It Down

A reason that some companies tell us they aren’t interested in using a firewall is that it might slow down your computer. With the advanced technology on offer today, you’ll find this isn’t the case at all. You don’t need to worry about your software or hardware working slower, as this just isn’t an issue with modern SonicWall firewalls. You’ll still be able to complete your work at the same speed as before while also knowing you are fully protected from malware and hackers. This is one investment you shouldn’t skip over and it will ensure you give yourself the protection you need for many years to come.

These are just five of the top online security myths we are constantly hearing today. If you have thought one of these myths is true for a while now, it’s time to start protecting your systems from potential attacks. With options on offer for companies of any size, it’s never too late to start protecting your work further. For more information about using a SonicWall firewall and how it can help your company, contact us today to discuss these security solutions with our team.

What is Endpoint Protection?

16/12/2021
by Paul Heritage

Endpoint protection is an approach to computer protection where computer networks are remotely bridged to client devices. With this type of security, you’ll find that there are many benefits to your business. With more concerns coming up each year surrounding computer security, we highly recommend taking the time to consider what the best option for protecting your business next year is. These are just a few of the reasons to consider endpoint protection with the help of a SonicWall firewall this year.

What is Endpoint Protection?

Combat Mass Attacks

Mass attacks are the most common threat to businesses today. You’ll find that every day there are countless attacks on businesses around the country. These include malware, email spam, ransomware, and standard computer exploits. These might seem like something that happens every single day, but they can do a huge amount of damage to your computer systems and your business as a whole. Your endpoint protection will destroy any of these risks and will ensure your computer systems keep running in a way that allows your business to be productive. This is the most modern and innovative solution to protect your computers for many years to come.

Protect Any Entry Point Within Your Business

With most businesses using dozens of different devices, you’ll find that phones, tablets, and laptops all put your business at a greater risk. While this can be a great option for businesses to allow people to work remotely from anywhere in the world. However, learning what is endpoint protection can help to protect your business from some of the most dangerous risks out there. When you use Windows, Mac, Android or iOS, you’ll be covered using absolutely any of these devices. You can restrict unauthorised access and software on any device, making it much easier to protect your business. With just one single package, you’ll have this full protection, offering one of the most comprehensive options on the market today.

Maintain Good Security in Your Business

Even the biggest businesses have been subject to issues in the past few years. You’ll find that endpoint protection offers you a greater chance of detecting and responding to these attacks. While it can’t guarantee protection against some of the most advanced attacks, you’ll find that it improves your overall approach to security. Instead of just waiting until it’s too late to react to issues, you’ll find that you treat the issue before it’s too late. Similar to our physical health, you’ll enjoy many benefits to the health of your computer systems with an endpoint security system.

Combat Human Errors

As human beings, we all make mistakes at some point or another in our careers. We aren’t as efficient as machines, and so naturally, some mistakes will happen in your business. When endpoints are managed by members of your team, you need to ensure that there is additional protection in place to avoid security breaches. While some users are more technologically savvy than others, they won’t be able to protect your computers from any potential issues. We naturally make small mistakes each day, and those could be the reason for your whole system failing in the future.

Technology is Constantly Evolving

When we consider the types of endpoint security, one thing to keep in mind is that technology is constantly changing, opening us up to various threats and issues. Each time a new device is launched or software is updated, there are more potential risks. A SonicWall firewall is your best solution to this issue, and our team will be here to ensure you benefit from all the advantages of using one of these in your business.

SonicWall firewalls are designed to keep up with the growing consumer demands that we see, and a SonicWall NSa might just be the thing that protects and saves your business this year. These next-generation SonicWall products can be used by businesses of all sizes, including small and medium-sized businesses. Your company is never too small to benefit from this technology, and we’ll be excited to see how the future looks for your company with the help of this protection.

As a business owner, looking after your computer systems should be one of your top priorities at all times. We highly encourage you to think about how you can protect your systems moving forward and ensure you put the needs of your business first at all times. With technology constantly changing, you need to think about looking after your business for many years to come, as there are always new threats out there to contend with. We recommend contacting our team today if you are looking for a SonicWall firewall so that we can discuss the best options for your needs. Our friendly team will be here to help with your endpoint protection and allow you to enjoy all of the benefits we’ve shared above.

Why You Need to Upgrade to the SonicWall TZ Firewall

16/12/2021
by Paul Heritage

For anyone who is familiar with SonicWall firewalls, you might have heard about the new SonicWall TZ firewall. This is one of the most exciting additions to their product range, and our SonicWall support team is thrilled to share more about this solution with you today. Let’s take a look at some of the top reasons you should upgrade to this latest product this year.

Why You Need to Upgrade to the SonicWall TZ Firewall

Protect a Large Number of Users

When a higher number of users are using your system at one time, you naturally put yourself at a greater risk. The new SonicWall TZ firewall is ideal for anyone who has a high number of users simultaneously needing to be active on your system. In comparison to other solutions on the market today, you’ll find that this is a great option for medium to large businesses, but smaller businesses will also benefit from this product as well. When you have more employees, you are more likely to be the victim of an issue that occurred due to human error. This is something we can do very little to avoid, so it’s best to always do everything you can to protect yourself.

Stop Advanced Threats

There’s no denying that hackers are becoming more and more advanced now. You’ll find that regardless of what type of business you own and operate, you’ll be more likely to be the victim of a cyber threat in the future. The SonicWall Capture Advanced Threat Protection sandbox offers you the protection you need against more persistent threats and these new and advanced attacks. Even if malware has never been seen before on your system, it will help to stop over a thousand attacks each day. SonicWall Capture ATP is only available on newer firewalls, which makes it one of the top reasons to upgrade your system this year.

Performance Won’t Be Slowed Down

You should never have to compromise performance just because you want to offer your business a more secure firewall. With more companies relying on video streaming during the recent pandemic, you need to ensure you can still push out content without impacting your performance. The new firewall offers you the SonicWall support you need to work with a high capacity and enjoy fast internet speeds. At the same time, you’ll appreciate the full protection you receive, and you’ll enjoy peace of mind knowing your company is protected for many years to come.

A Cost-Effective Solution

When we are first approached by companies looking for support from SonicWall-Sales, they often seem concerned about the cost this will add to their company. Firstly, we always encourage you to think about security as a long-term investment for your company. When you stop issues from happening in the first place, you’ll find that you save a fortune clearing up the mess after being the victim of an attack. One thing we love about the SonicWall products and services is that they really are for any type of business. They are perfect for small and medium-sized businesses, and you’ll find that they are one of the best value for money options on the marketplace today. Support costs will also be reduced as you’ll find there are fewer issues on your system, and our SonicWall UK support team will be here to help you at any point should an issue occur.

Protect Your Remote Workforce

Finally, one of the biggest reasons that you need to upgrade your firewall this year is due to the number of remote employees. You need these employees to be able to work safely and securely from anywhere and at any time. The larger number of people who are using a VPN, the more chance you will have of an attack taking place. SonicWall support UK is available for anyone with a large remote workforce, which is the majority of companies out there today. We’ll offer you SonicWall firewall support for your employees based anywhere in the world. Many companies find they are saving a huge amount of money by allowing their employees to work from home. Invest this back into securing your network and the future of your business with this upgraded firewall.

These are just a few of the top reasons that we recommend anyone upgrades to the SonicWall TZ firewall this year. You’ll find that it’s a good solution for businesses of any shape and size, and our team will be here to ensure that you are fully protected for many years to come. If you have further questions about finding the right firewall for your business, contact our team today. We’ll discuss the solutions that are currently on offer for your business and help to match you with the right one to protect you and your team regardless of what industry you are operating in.

Gen7 prices have now increased.

30/11/2021
by Paul Heritage

Who Invented the Firewall?

09/11/2021
by Paul Heritage

If you’ve been using a SonicWall firewall for some time now, you no doubt wonder who first came up with this excellent security solution. The firewall is one of the best things to happen to businesses. Of course, as with any incredible invention, many people claim they are the father of the firewall. Keep reading as we head back in time to learn who invented the firewall.

Who Invented the Firewall?

Who is the Inventor of the Firewall?

Over the years, there have been many discussions about who invented the firewall technology. Nir Zuk says he developed the technology which we now see in all SonicWall firewall features today. However, David Pensak is the one who claims to have built the first firewall that was a commercial success. On top of that, we have Marcus Ranum, who also claims to be the father of the firewall. As you can see, it’s a complicated story with so many people taking the claim to the title of the inventor of this incredible solution. However, other people state none of them invented the firewall, and they were just involved in creating the filtering technology that’s critical to its success.

The History of the Firewall

All of the individuals listed above were involved in the evolution of the firewall in some way. While some can be traced back to the start of the firewall, others played their role within the technology development area. In fact, it can be said that all of these men and a few other figures helped to make the first firewall and develop this technology to what it is today. When looking at who invented firewalls, we need to head back to the late 1980s. You might be surprised to hear this technology dates that far back, but this was when it was first developed by the Digital Equipment Corporation. At this time, the firewalls relied on the Open Systems Interconnection model and the first four layers of this model. These ensured packets were either dropped or allowed to move forward in the system, creating the basic function of a firewall.

While this was a great resource to begin with, it soon turned out to be very resource-heavy, which is why Check Point Software Technologies then introduced the circuit-level firewalls. These were later called stateful firewalls, and this was what is considered to be the first generation of firewalls we know and use today. This then led to the packet-filtering firewall and became stateless in regards to the connection aspect of this system.

Modern Firewall Solutions

If you’ve been using a SonicWall small business firewall, you’ll know that the technology has come on a long way since this time. The firewall development has continued for many years to make the solutions we know and use currently. Organic development led to the firewalls that are on the market today, and you’ll find that they now all benefit from user content management and intrusion prevention. The open-source firewall first came to the market in 1993, which offered more layers of firewalling for companies. This was a huge leap forward for the industry and had a heavy influence on products for the next two decades. This was released by Trusted Information Systems, but DEC had also launched a product a couple of years earlier, which was very influential within the industry.

The main takeaway from this period in the history of the firewall is that layered security is the way forward. While network and perimeter firewall solutions might not assist with the cloud, you’ll find that they are still critical for any business today. The need for strong border controls has never been higher, so we can be sure this layered security model is here to stay for many years to come. As with anyone operating in the technology industry, there are always going to be new solutions and changes made to products. Next-generation firewalls will only continue to fight the issues that companies are currently facing. Even small and medium-sized businesses are finding solutions tailored to their needs. Our team knows that not one product is right for every business, and the wide variety of firewalls on offer is one of the best things about the changes in the past years.

There’s no clear answer to the question of who invented the firewall, but it appears to be a joint effort that brought us to where we are today. While we’re sure many people would like to claim the title of the father of the firewall, it’s important that we realise that so much time and technology went into protecting our businesses today. No business should be operating without a firewall, as it’s one of the best solutions for businesses working online. Are you ready to upgrade your firewall solution this year? Contact our team today or check our page for more information about the best firewall options for your business.

Read the next blog: The Top Online Security Myths

*** PRICING UPDATE (SonicWall Annoucement) - Product Prices Increasing Starting December 1st

04/11/2021
by Paul Heritage

This is an announcement from SonicWall on Monday 1st November 2021

Why is SonicWall increasing prices?
Like every business in nearly every industry, SonicWall is not immune to global supply-chain challenges. To date, we’ve worked tirelessly to absorb industry-wide cost increases for our distributors and partners as component constraints, staffing shortages and shipping challenges continue to impact the global economy.

Is this a temporary price increase?
No, this is not temporary. Like every other security vender, SonicWall continues to see increased hardware, services, support and logistics costs, including a 700% increase in shipping container costs; 400% increase in chip costs; 1500% increase in memory costs; 400% increase in air freight costs; and 12-plus weeks for door-to-door ocean freight deliveries.

When will my distributor have new pricing?
SonicWall distributors will have new pricing available on December 1, 2021.

How do I find my new prices?
Contact your distributor on or after December 1, 2021.

Does this increase apply to all products?
While we routinely evaluate cost structures, this announcement only applies to Gen 7 firewalls (e.g., TZ, NSa, NSsp) and services for those products.

Why are services included in the price increase?
Service SKUs also include hardware costs, so services also are impacted by the same supply-chain challenges. To offset some of these increases, SonicWall is evenly distributing increases across the entire Gen 7 portfolio.

What price book will be used during November2021?
The November price list will be used in November2021. The December price list will be publishedon or before December 1, 2021.

Best Practices for Cloud Security in 2021

29/10/2021
by Paul Heritage

Cloud security is something almost any business needs to pay more attention to in this day and age. If you haven’t taken the time to think about the cloud and the security solutions you need for your business, we encourage you to keep reading as we share the best practices for cloud security. SonicWall firewalls software is one of the best solutions for cloud security, and we’d highly encourage you to invest in this solution to protect your business in the future.

Best Practices for Cloud Security in 2021

Why is Cloud Security So Important?

Cloud security is becoming more of a risk to companies around the world. It’s believed that by last year, over half of the world’s companies’ budgets would have increase in this area due to the number of risks to keep in mind. However, so many people don’t realise that their current security setup has no use in the cloud. You’ll find that cybercrime is only continuing to increase year after year, which is why looking after your business in the cloud is so important. While the cloud offers many advantages to business owners, you need to ensure you are protecting yourself while working in the cloud.

Cloud Security Best Practices

By following these best practices, you can ensure you protect your business when working in the cloud. While incidents could happen at any time, the more you prepare for all eventualities, the less likely you’ll be to suffer from issues in the future.

Choose the Best Cloud Service Provider

If you aren’t already working in the cloud, we recommend taking the time to research the right cloud service provider for your needs. Opt for one which has some form of cloud security built into the solution. Read reviews online and see what other companies have to say about their services. While a company can share with you everything they have to offer, it’s always best to hear what other customers have to say first. Ask them to confirm what they offer and show certificates where applicable.

Train Your Team

When we install a secure cloud system within our business, so much of the time and effort goes into the installation itself. While a SonicWall firewall will offer your office many benefits, you still need to train your team on why you are using this in the first place. The more your team are aware of the risk of cybersecurity threats, the less likely they will be to click on a malicious link. They’ll also need to know the correct way to report any concerns they have. By offering an open chain of communication to your whole team, you can be sure that everyone is on the same page and isn’t afraid to bring up any concerns they have about your cloud security software.

Consider Your Password Policy

An important part of protecting any business and software system is the password that you are using. Your business needs to have a policy in place for secure cloud services to ensure passwords are changed frequently. Old and new employees need to be reminded of their privileges, and you should have the ability to take these away as needed if someone leaves your organisation. When you first welcome an employee to the company, ensure they are only given access to the tools they truly need to do their job. While it can be so easy just to give everyone access to anything in your business, this is usually a recipe for disaster for most business owners.

Opt to Use SonicWall Firewall Software

SonicWall firewalls are one of the world’s leading solutions for companies who are concerned about cloud security. Since the invention of the firewall, the team at SonicWall has invested their time and energy into creating resources that are suitable for businesses of all shapes and sizes. Your office is never going to be too small to benefit from working with our team and finding the right firewall for your needs. Many small business owners believe they don’t need to worry about cloud security, but this couldn’t be further from the truth. Start protecting your business today by investing in the right solutions to protect your company from cybercriminals. You’ve invested so much time and money into your business already, so make sure you aren’t letting that go to waste.

Cyberattacks are continuing to increase in regularity following the recent pandemic. With criminals finding new ways to attack businesses, you need to ensure you are doing everything in your power to protect yourself this year. Contact our team today for more information about how SonicWall firewalls can help to protect your business. It’s never too late to start making changes to the way you operate. By following the best practices for cloud security we shared above, you can protect yourself and your employees for many years to come.