Network Security Virginia - Computer Network Service Virginia

EternalRocks worm combines seven leaked NSA attack tools

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Only 9% of parents want kids to be tech entrepreneurs

Study shows UK parents would prefer their children to have a traditional job such as doctor, teacher or lawyer

Dutch railway uses IoT to reduce people jams

Railway stations in The Netherlands are monitoring the movement of travellers to manage traffic flow and reduce people jams

Security Think Tank: Malware is sneaky

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

HSBC voice authentication tricked by twins

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

Middle East largely unscathed after WannaCry cyber attack

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

Windows 7 accounts for most WannaCry infections

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

Denmark's Spar Nord bank in app dispute with Apple

Danish bank Spar Nord considers legal dispute with Apple over the supplier’s rejection of mobile app

McAfee researchers test WannaCry recovery method

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Manx Telecom streamlines its business with VMware NFV

After deploying an NFV platform to replace its IMS service, Isle of Man-based telco has seen substantial improvements to its business agility and processes

WannaCry ransomware attack should push hospitals to gauge certain tech

The WannaCry ransomware attack affected hundreds of countries and hundreds of thousands of systems, including health systems. Experts discuss what healthcare orgs need to do.

Command and control communications key to detecting threats

Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher

How to simplify IT integration

Pressure on IT is mounting and point-to-point integration does not scale. Opening up APIs is one of the approaches now being considered

Interview: Claude Moraes, MEP and EU Civil Liberties Committee chair

Claude Moraes, chair of the European Parliament's Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit

Microsoft to open African cloud datacentre region in 2018

Software giant plans to capitalise on business demand for its cloud services in Africa by offering users access to locally hosted Azure and Office 365

Neustar launches international security council

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Brits expect driverless cars to outnumber normal cars in 15 years

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Interview: Mark Potter, CTO, HPE

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

Network Security


Network Security Services

With TCB, network security is never a problem. We secure your network both internally and externally. TCB is able to balance cost and effectiveness by recommending the right technology for the job. From firewalls all the way to desktop recording and document tracking, our professional and certified consultants will make sure your network is prepared for battle.
 

Network Security Assessment

TCB's no cost Network security assessment requires just one on-site visit where we will look at your networks most vulnerable spots for viruses, intrusions, hackers, and all other types of security threats. We outline any discovered vulnerabilities both externally and internally. Our certified consultants work with you to devise a proper course of action to make sure you are protected.
 

Desktop / Server security:

Sometimes, protection from the outside just isn’t enough. Where do you turn when your internal staff is both a blessing and a curse? TCB offers desktop recording and document tracking software that will help you determine the cause of any fault. Desktop recording takes a snapshot of the screen every 10 seconds or when the mouse or keyboard is active. Document tracking lets you find out who did what with any document on your network. This means you can always be there without being there. The software is 100% transparent and can only be accessed through a special key combination.

Find the best value for your business:

Desktop/Laptop/Workstation Server
Features
Anti-Malware Included Included
Browser Exploits Included Included
Anti-Virus Included Included
Anti-Trojan Included Included
Anti-Spyware Included Included
Anti-Worm Included Included
Anti-Rootkit Included Included
Anti-Phishing Included Included
Secure Network Included Included
Outbound Email Protection Included Included
Inbound Email Protection Included Included
Bootable Rescue CD Included Included
On-demand Scanning Included Included
Auto-clean Infected Files Included Included
Scan compressed Files Included Included
Infected File Quarantine Included Included
Instant Messaging Protection Included Included
Registry Startup Protection Included Included
Desktop/Laptop/Workstation Fee $ $
Server Fee $ $