<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security Archives - Curve IT</title>
	<atom:link href="https://www.curveit.com/category/it-support/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.curveit.com/category/it-support/security/</link>
	<description>Converged Connectivity for the Built Environment</description>
	<lastBuildDate>Thu, 19 Mar 2026 19:24:10 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.curveit.com/wp-content/uploads/2020/03/cropped-favicon-32x32.png</url>
	<title>IT Security Archives - Curve IT</title>
	<link>https://www.curveit.com/category/it-support/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Curve IT Managed IT Services: Why it’s time your organisation moved on from Windows 7</title>
		<link>https://www.curveit.com/it-support/windows-upgrades-managed-it-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-upgrades-managed-it-services</link>
		
		<dc:creator><![CDATA[Curve IT]]></dc:creator>
		<pubDate>Mon, 17 Feb 2020 12:10:57 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Operational support]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=3893</guid>

					<description><![CDATA[<p>After over a decade, Microsoft has decided to bring Windows 7 to ‘end of life’ status. Support for the programme ended on January 14th. This means that Microsoft will no longer provide technical support for any issues, ongoing software updates or security patches. What does this mean for Windows 7 users? Microsoft has stated that &#8230; <a href="https://www.curveit.com/it-support/windows-upgrades-managed-it-services/">Continued</a></p>
<p>The post <a href="https://www.curveit.com/it-support/windows-upgrades-managed-it-services/">Curve IT Managed IT Services: Why it’s time your organisation moved on from Windows 7</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>After over a decade, Microsoft has decided to bring Windows 7 to ‘end of life’ status. Support for the programme ended on January 14<sup>th</sup>. This means that Microsoft will no longer provide technical support for any issues, ongoing software updates or security patches.</p>



<h3 class="wp-block-heading"><strong>What does this mean for Windows 7 users?</strong></h3>



<p>Microsoft has stated that running Windows 7 without continued software and security updates will leave users at greater risk for viruses and malware. The reason for this is that when Microsoft send out their monthly updates, security patches are a key part or this. Windows 7 will use much of the same code as Windows 10, however, it won’t be updated and potential weaknesses will no longer be addresses anymore. With the number of current users still standing in hundreds of millions, hackers are likely to use potential weaknesses to target computers still running Windows 7.</p>



<h3 class="wp-block-heading"><strong>What should I do?</strong></h3>



<p>Microsoft have stated that the best thing to do if you are still operating a Windows 7 system is to buy a new device that is running Windows 10. Whilst it is possible to download Windows 10 on a computer that was previously running Windows 7, Microsoft have advised that this is not recommended. This is because an old system running Windows 7 may have difficulties in running a modern system in Windows 10. <a href="https://www.techradar.com/uk/how-to/how-to-prepare-for-windows-7-end-of-life">Techradar</a>, for example, recommends that to effectively run Windows 10 you need at least a 2GHz dual-core processor, 4GB of RAM (8GB ideally) and a 160GB hard drive. If your computer is not up to these standards, then it might be time to speak to Curve IT Managed IT Services for some recommendations on treating yourself to a new device.</p>



<p>If, however, your computer does fit those requirements there are some benefits to upgrading your old system. It is the easiest solution for a start, and you are able to keep your documents in one place. You will have to buy a Windows 10 license, however, and these can be expensive to purchase, which is worth keeping in mind, especially for businesses with a large number of devices and users.</p>



<h3 class="wp-block-heading"><strong>What if I don’t do anything?</strong></h3>



<p>Initially, Windows 7 will still run as normal. It just won’t be getting the patches each month. You can keep your computer ‘patched’ manually. This reduces the risk to some degree but devices utilising a Windows 7 system are still more vulnerable than their Windows 10 counterparts. The National Cyber Security Centre (NCSC) said that it would ‘urge those using the software after the deadline to replace unsupported devices as soon as possible, to move sensitive data to a supported device and not to use them for tasks like accessing bank and other sensitive accounts’.</p>



<h3 class="wp-block-heading"><strong>How Curve can help?</strong></h3>



<p>The Managed IT Services team at Curve has already helped a range of businesses move to Windows 10. As well as ensuring your organisation is running an up-to-date, supported operating system, making a move to Windows 10 can also help your company deploy applications and infrastructures that will help support flexible and collaborative working practices. This includes moving to cloud based software, such as the latest version of Microsoft 365, and making use of collaboration tools such as Microsoft teams.</p>



<p><strong><em>Contact Curve to talk about how our Managed IT Services team can help </em></strong><a href="https://www.curveit.com/contact/"><strong><em>your business upgrade</em></strong></a></p>
<p>The post <a href="https://www.curveit.com/it-support/windows-upgrades-managed-it-services/">Curve IT Managed IT Services: Why it’s time your organisation moved on from Windows 7</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why it’s time to embrace ‘business class’ WiFi networks</title>
		<link>https://www.curveit.com/infrastructure/business-class-wifi-networks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=business-class-wifi-networks</link>
		
		<dc:creator><![CDATA[Curve IT]]></dc:creator>
		<pubDate>Mon, 03 Jun 2019 10:34:22 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operational support]]></category>
		<category><![CDATA[WiFi]]></category>
		<category><![CDATA[business wifi]]></category>
		<category><![CDATA[wifi infrastructure]]></category>
		<category><![CDATA[wifi networks]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=3191</guid>

					<description><![CDATA[<p>Wireless devices have taken over the workplace. From laptops to phones and tablets, their numbers are increasing all the time and they’re all looking for connectivity. Yet despite this, a large number of UK businesses and organisations are still lagging behind when it comes to developing robust infrastructure and a reliable, secure, Wi-Fi service. Many &#8230; <a href="https://www.curveit.com/infrastructure/business-class-wifi-networks/">Continued</a></p>
<p>The post <a href="https://www.curveit.com/infrastructure/business-class-wifi-networks/">Why it’s time to embrace ‘business class’ WiFi networks</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wireless devices have taken over the workplace. From laptops
to phones and tablets, their numbers are increasing all the time and they’re
all looking for connectivity.</p>



<p>Yet despite this, a large number of UK businesses and
organisations are still lagging behind when it comes to developing robust
infrastructure and a reliable, secure, Wi-Fi service.</p>



<p>Many small businesses in particular still take the approach of contracting with wireless broadband <a href="https://en.wikipedia.org/wiki/Internet_service_provider">Internet Service Providers</a> (ISPs) whose packages are intended to be used by individual consumers.</p>



<p>There’s a number of issues with this approach. For starters,
the internet speeds provided might not be up to the job. However, following
investment in full fibre to the premise infrastructure across much of the UK,
this is becoming less of an issue.</p>



<p>Difficulties are more likely to be encountered when it comes
to the reliability of coverage within the business environment itself and
challenges associated with achieving the tailored network configuration
typically required by companies.</p>



<p>WiFi networks intended for the consumer usually focus on
simple set-ups and the delivery of broadband to the door only, with little
support for configuration.</p>



<p>In this blog, we look at some of the specific considerations
needed when creating ‘business class’ networks.</p>



<h2 class="wp-block-heading"><strong>The changing workspace and network requirements</strong></h2>



<p>The workplace was once much simpler. You had your desktop
machine connected to the server, corporate network and the internet via an ethernet
cable. People had laptops and they too had to be wired into the office cabling
if you had any serious work to do. Then came Wi-Fi and broadband and you could
use your laptop on a wireless network so long as you didn’t stray too far from
the one wireless router. Now many offices have moved across to an all wireless
set up. People must be able to take their connected device into a meeting room
or another office without losing their session. </p>



<p>It’s not just the main office either. While the Wi-Fi there
might be OK it’s often not where all the work goes on in modern organisations.
People have informal meetings throughout a building, from the reception area to
the dining room. With the trend to build open spaces into many new office
developments people might also have meetings outside. An incomplete office Wi-Fi
network will mean that people are restricted to formal meeting areas and this,
in turn, can impact on productivity. For organisations with multiple branch
offices, it is also important to keep Wi-Fi connectivity consistent across
locations. All these elements should be considered when selecting WiFi services
and contemplating set-up.</p>



<p>Network security is also another major area for
consideration. Businesses are responsible for the network they provide and it’s
important to prevent both staff and visitors from putting themselves at
unnecessary risk by building a secure Wi-Fi network within your building or
campus environment. Again, this requires specific considerations and
configurations not typically provided as default by ISP packages intended for
the consumer. It is also important when considering Bring-Your-Own-Device
(BYOD) users, whose devices may pose a greater security risk. Implementing an
Identity and Access Management (IAM) policy for example, which limits the access
certain users have, will help further boost security.</p>



<h2 class="wp-block-heading"><strong>A ‘business class’ approach</strong></h2>



<p>The set-up of a WiFi network in a business environment
requires significantly more thought than a home network. From considering
reliability and coverage levels across a wider area to determining how the
network itself is set-up requires careful management. </p>



<p>If you’re looking for support in developing a tailored WiFi
network for your business contact the team here at <a href="https://www.curveit.com/">Curve IT</a>.</p>
<p>The post <a href="https://www.curveit.com/infrastructure/business-class-wifi-networks/">Why it’s time to embrace ‘business class’ WiFi networks</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why co-living is the future for Generation Z but only with robust PRS internet services</title>
		<link>https://www.curveit.com/wifi/prs-internet-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=prs-internet-services</link>
		
		<dc:creator><![CDATA[Curve IT]]></dc:creator>
		<pubDate>Tue, 08 May 2018 17:42:14 +0000</pubDate>
				<category><![CDATA[BTR]]></category>
		<category><![CDATA[Co-living]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Operational support]]></category>
		<category><![CDATA[PRS]]></category>
		<category><![CDATA[WiFi]]></category>
		<category><![CDATA[build to rent]]></category>
		<category><![CDATA[Curve IT Services]]></category>
		<category><![CDATA[essential living]]></category>
		<category><![CDATA[indoor wifi]]></category>
		<category><![CDATA[it infrastructure]]></category>
		<category><![CDATA[private rental sector]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=2370</guid>

					<description><![CDATA[<p>The benefits of co-living include building friendships in the physical world as well as the digital.</p>
<p>The post <a href="https://www.curveit.com/wifi/prs-internet-services/">Why co-living is the future for Generation Z but only with robust PRS internet services</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="p1">Co-living is one of the buzzwords of the moment</h3>
<p class="p1">Sharing space with strangers is becoming an increasingly popular option for a new breed of professionals looking for housing that combines private living space with shared communal facilities.</p>
<p class="p1">And with many new co-living developments offering shared spaces like wellness studios, gyms, and gardens or terraces for BBQs and entertaining, it’s becoming easier than ever for residents to get to know their neighbours.</p>
<p class="p1">Rising rents and an increase of young professionals looking for living spaces in urban areas is one of the factors driving the trend, but there is a deeper motive for the development towards multi-occupancy constructions.</p>
<p class="p1">While the modern version of co-living is a little different to the hippy communes that began to spring up in the Sixties, or the artist communities prevalent in places such as Germany and Denmark, the concept is based on the same ethos: to create a lifestyle based on sharing and community.</p>
<h3>People need connection in the physical world as well as online</h3>
<p class="p1">In an age where much day to day contact is online, and with <a href="http://www.if.org.uk/2018/03/13/many-young-adults-suffer-chronic-loneliness-new-research-suggests/">loneliness a widespread issue</a>, a sense of &#8216;real&#8217; connection is increasingly welcome.</p>
<p class="p1">The growth of the sharing economy and the rise of co-working and other partnerships suggests there is an appetite for greater sharing and social engagement, says architect Manisha Patel, who specializes in urban design and planning for practice PRP.</p>
<p class="p1">In the recent RSA report ‘<a href="https://medium.com/co-living-and-the-common-good">Co-living and the common good</a>’ Patel writes of the balance between privacy and social interaction that co-living manages to address – and points out that humans are the most social of mammals.</p>
<p class="p1">“Our communication skills set us apart; social interaction and the search for a sense of wellbeing is hardwired into all of us,” she says. “The desire for communal interaction is balanced with the need for each individual to choose their degree of separation.”</p>
<p class="p1">While physical connection is important, so too is the technology that allows people to connect with each other. As you might expect, ‘Generation rent’ is looking for far more than the bare essentials in their new home: the burgeoning use of smart phones, smart TVs and a plethora of connected home devices mean fast, immediate access to broadband and WiFi connectivity is today as essential as running water. Technological progress has enabled large new developments to improve significantly by providing a seamless connection to their facilities.</p>
<h3>Curve IT is strategically placed in the PRS internet services sector</h3>
<p class="p1">Curve IT has been working with a number of BTR and PRS operators over the last few years, notably <a href="http://www.essentialliving.co.uk"><span class="s1">Essential Living</span></a> with whom we worked on with the flagship new builds Dressage Court, Vantage Point and Creekside Wharf (opening mid to late 2018).</p>
<p class="p1">Residents received high-speed internet access with broad WiFi coverage and a high quality branded portal page, both in their apartment and throughout the building, from the day they moved in.</p>
<p class="p1">With hundreds of residents living in close proximity using multiple devices, often at the same time, providing Wifi connectivity to support a multi-dwelling unit (MDU) requires a deep understanding of the fundamentals of WiFi technology, and this is where Curve IT’s experience comes to the fore.</p>
<p class="p1">We are passionate about delivering PRS internet services through <a href="https://www.curveit.com/services/wifi/">robust, scalable WiFi networks</a> for multi-occupant buildings, and have a specialist team which designs, creates and delivers an intelligent, futureproof <a href="https://www.curveit.com/services/it-consultancy/"><span class="s2">IT infrastructure</span></a>.</p>
<p class="p1">Curve IT are involved from <a href="https://www.architecture.com/knowledge-and-resources/resources-landing-page/riba-plan-of-work">RIBA stage 1-3</a>  onwards, and early site visits enables our IT team to translate ideas into a high tech spec which can be incorporated before construction even begins.</p>
<p class="p1">As Patel puts it so succinctly: “These technologies have the potential to allow co-living residents to share resources more efficiently; to make opportunities for social interaction more visible or likely; and to connect residents to services and civic opportunities within the wider area in which they live.”</p>
<p class="p1">And as Essential Living says in its recent blog about the benefits of co-living, “It helps to build friendships in the physical world rather than the digital, and being part of a thriving community is perhaps the oldest and most effective way to make those connections.”</p>
<p class="p1">Co-living offers more connection – both on and offline.</p>
<p class="p3"><strong>To talk to one of our expert IT consultants regarding our WiFi design practice <a href="https://www.curveit.com/contact/"><span class="s3"><i>Contact the team</i></span></a><i> at Curve IT on </i><a href="mailto:contact@curveit.com"><span class="s4"><i>contact@curveit.com</i></span></a> or call 01273 806220.</strong></p>
<p>The post <a href="https://www.curveit.com/wifi/prs-internet-services/">Why co-living is the future for Generation Z but only with robust PRS internet services</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why BTR Operators need a Technology Brand Standard</title>
		<link>https://www.curveit.com/wifi/build-to-rent-internet-planning/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=build-to-rent-internet-planning</link>
		
		<dc:creator><![CDATA[Curve IT]]></dc:creator>
		<pubDate>Wed, 02 May 2018 15:45:41 +0000</pubDate>
				<category><![CDATA[BTR]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Operational support]]></category>
		<category><![CDATA[PRS]]></category>
		<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[WiFi]]></category>
		<category><![CDATA[prs]]></category>
		<category><![CDATA[Wifi]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=2363</guid>

					<description><![CDATA[<p>In the Build to Rent market it would be inconceivable to rent an apartment where a guest could not get online immediately. Curve IT designs and creates cutting edge, robust connectivity solutions.</p>
<p>The post <a href="https://www.curveit.com/wifi/build-to-rent-internet-planning/">Why BTR Operators need a Technology Brand Standard</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="p1">As a BTR operator, how good is your build to rent internet, wifi and network technology brand standard?</h3>
<p class="p1">As home working increases and social media and traditional media formats move ever more to digital, FOBO &#8211; Fear Of Being Offline &#8211; fills many people with dread, and in the Build to Rent market it would be inconceivable to rent an apartment where a guest could not get online immediately.</p>
<p class="p1">With this <a href="https://www.terrapinn.com/conference/connected-britain/index.stm">reliance on ubiquitous high-speed connectivity</a>, making sure your building has great Wifi is crucial. Curve IT believes that to ensure you are competitive in the marketplace you should have a clear strategy for what you want to deliver and how you will achieve it.</p>
<h3 class="p1">BTR operators might want to consider some questions around the provision of Wifi:</h3>
<ul>
<li class="p1">How can resident and customers connect? And their guests?</li>
<li class="p1">Should you block certain content?</li>
<li class="p1">Should Wifi be available only in certain areas?</li>
<li class="p1">Will you charge, and if so how, when, what for, and how much?</li>
<li class="p1">Should speed or the number of devices be limited?</li>
</ul>
<p><figure id="attachment_1992" aria-describedby="caption-attachment-1992" style="width: 300px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" class="wp-image-1992 size-medium" src="https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living-300x200.jpg" alt="Girl on computer using WiFi | IT infrastructure for smart living" width="300" height="200" srcset="https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living-300x200.jpg 300w, https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living-1024x683.jpg 1024w, https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living-768x512.jpg 768w, https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living-1536x1025.jpg 1536w, https://www.curveit.com/wp-content/uploads/2017/07/IT-infrastructure-for-smart-living.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-1992" class="wp-caption-text"><span style="font-size: 16px; line-height: 1.5;">While the first reaction of an operator may be, ‘Give everyone everything, all the time’, this approach can often give users a worse experience. As technology has become more advanced </span><a style="font-size: 16px; line-height: 1.5;" href="https://www.curveit.com/news/why-should-build-to-rent-operators-consider-a-converged-network/">there are many ways to shape and manipulate the available bandwidth</a><span style="font-size: 16px; line-height: 1.5;"> and your offering to provide the best possible solution. As no two buildings are identical, so Wifi networks should be adapted as well.</span></figcaption></figure></p>
<p class="p1">For project planning this can raise many questions. The first decisions should probably be around the build to rent internet network and whether this is something that the Operator wants to provide and manage themselves, or contract out to a company, or whether each individual supplier of IP services will provide their own. Is this likely to be in a capex or an opex budget?</p>
<p class="p1">At <a href="https://www.architecture.com/knowledge-and-resources/resources-landing-page/riba-plan-of-work">RIBA stage 1-3</a> it’s imperative that the M&amp;E specification &#8211; and the vendor proposals received from this &#8211; match your ideas and values in your brand standard. If the design does not reflect what you want to achieve then variations and additional costs become more likely. Or worse you have a sub-standard installation of technology services.</p>
<p class="p1">Curve IT has years of experience working with customers to define their brand standards, and <a href="https://www.curveit.com/news/designing-intelligent-it-infrastructure-for-the-prs/">designing and creating solutions</a> to meet these. We have advised on Wifi, networks, broadband provision, structured cabling, voice services, CCTV, TV and IPTV solutions amongst others.</p>
<p class="p1"><strong>We can talk about your wishes and requirements and can be reached at <a href="mailto:contact@curveit.com"><span class="s1">contact@curveit.com</span></a> or 01273 806220</strong></p>
<p>The post <a href="https://www.curveit.com/wifi/build-to-rent-internet-planning/">Why BTR Operators need a Technology Brand Standard</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why should Build to Rent operators consider Converged Networks?</title>
		<link>https://www.curveit.com/wifi/build-to-rent-converged-networks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=build-to-rent-converged-networks</link>
		
		<dc:creator><![CDATA[Curve IT]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 15:15:18 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Operational support]]></category>
		<category><![CDATA[PRS]]></category>
		<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[WiFi]]></category>
		<category><![CDATA[build to rent]]></category>
		<category><![CDATA[converged networks]]></category>
		<category><![CDATA[Curve IT Services]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[it infrastructure]]></category>
		<category><![CDATA[private rental sector]]></category>
		<category><![CDATA[smart living]]></category>
		<category><![CDATA[Wifi]]></category>
		<category><![CDATA[wifi connectivity]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=2344</guid>

					<description><![CDATA[<p>A high tech BTR development with a converged network means all services can run within one infrastructure, offering better performance, reduced cost and more flexibility.</p>
<p>The post <a href="https://www.curveit.com/wifi/build-to-rent-converged-networks/">Why should Build to Rent operators consider Converged Networks?</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">What is a converged network?</h3>



<div>In simple terms a converged network is one where the data, video and telephone (voice) communication are grouped into a single network.</div>



<div>All of the services run over one set of infrastructure (switches and cabling), and the network is usually designed and managed by one company.</div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What services and applications could sit on a build to rent converged network?</h3>



<ul class="wp-block-list"><li>HSIA &#8211; (high speed internet access) for residents</li><li>IPTV &#8211; television services</li><li>VoIP – Voice over IP telephony services for residents and staff</li><li>Access control and door locking systems</li><li>CCTV</li><li>Building Management Systems</li><li>Property Management Systems</li><li>Point of Sale</li><li>Digital Signage</li></ul>



<div>In broad terms if the service or application is IP based, ie a packet on a network, then it can normally be part of a converged network.</div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What are the advantages of a build to rent converged networks?</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading">Better performance;&nbsp;Reduced cost;&nbsp;More flexibility;&nbsp;Minimising environmental impact</h4>



<ul class="wp-block-list"><li style="text-align: left;"><strong>Lower cost of installation:</strong> installing one core <a href="https://www.curveit.com/services/it-consultancy/it-infrastructure-planning/">infrastructure</a> can reduce the amount of cabling required, and ensure that switches are used in the most efficient way. We have seen cost reductions of around 30% moving from a traditional network architecture to converged.</li><li style="text-align: left;"><strong>Better network management:</strong>&nbsp;a high-performing network is critical for the smooth operation of all the services within your building and having a converged network allows you to choose a single operator to oversee these services, and so offer a better level of service to your residents and team. In the past you may have multiple different networks all managed by different vendors, meaning different SLA’s, help desks, operating hours etc.&nbsp;A converged network has one management platform which can allow better monitoring and allow issues to be identified and dealt with much more quickly.</li><li style="text-align: left;"><strong>Flexibility and future proofing:</strong> Having an enterprise grade active network means adding new or extra services and applications can be completed much more easily and potentially without having to add new cabling or hardware. It’s impossible to say any technology is ‘future-proof’ however the 10Gb standard is currently recommended and fully suited for most needs.</li><li style="text-align: left;"><strong>Better design and hardware:</strong>&nbsp;with all services running through one core infrastructure it often proves more cost-effective to increase the sophistication, capacity and performance of this core to levels that would not be commercially sensible if running multiple networks. We typically see a move from multiple 1Gb in a traditional environment to 10Gb in a converged, offering potentially a huge uplift in performance. This will normally include resiliency and redundancy to a much higher level.</li><li style="text-align: left;"><strong>Minimising environmental impact:</strong> <span style="line-height: 1.5;">a single connection manages and operates all the systems, meaning reduced power usage and carbon footprint. Less hardware takes up less space and ensures the right amount of switch ports are available, in the right locations. Monitoring network ports, cables, connectors and components in real time with an intelligent infrastructure management system allows the network to be managed far more efficiently and optimises energy consumption.</span></li></ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">&nbsp;Are there other considerations?</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading">Many, and this is where the <a href="https://www.curveit.com/news/designing-intelligent-it-infrastructure-for-the-prs/">design and management skills</a> of Curve IT are paramount. These are just a few of the many considerations you will need to take into account.</h4>



<ul class="wp-block-list"><li>Resiliency – how to deal with power failures. We can <a href="https://www.curveit.com/services/it-consultancy/">advise</a> on UPS or generator back-up power.</li><li>Network resiliency – spanning tree? What support packs on hardware?</li><li>Redundancy – internet services into and out of the building and the routes these could take. Do you need geo-diverse routings? How many 9’s in your SLA?</li><li>Bandwidth management (WAN) – what do you need and when do you need it? What is the best model? Who is the best provider and do they have the interconnects you need?</li><li>Bandwidth management (LAN) – what applications do your residents / team need? Should some be limited? Do you want a revenue stream?</li><li>QoS – how, where and when?</li><li>VLANs – who and how to manage?</li><li>PAN – do your residents need a Personal Area Network?</li></ul>



<div>&nbsp;<em>If this seems daunting feel free to <a href="https://www.curveit.com/contact/">Contact the team</a> at Curve IT on contact@curveit.com or 01273 806220</em></div>



<h1 class="wp-block-heading">&nbsp;</h1>



<div>&nbsp;</div>
<p>The post <a href="https://www.curveit.com/wifi/build-to-rent-converged-networks/">Why should Build to Rent operators consider Converged Networks?</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WiFi Security Compromise</title>
		<link>https://www.curveit.com/wifi/wifi-security-compromise/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wifi-security-compromise</link>
		
		<dc:creator><![CDATA[wandcadmin]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 12:33:41 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[WiFi]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[IT Support Brighton]]></category>
		<category><![CDATA[Wifi]]></category>
		<category><![CDATA[wifi brighton]]></category>
		<category><![CDATA[wifi patching]]></category>
		<category><![CDATA[wifi security]]></category>
		<category><![CDATA[wifi security flaw]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=2114</guid>

					<description><![CDATA[<p>Researchers have detected a vulnerability in WiFi Security putting devices at risk of attack.  Proactive patching is recommended as fixes are released.</p>
<p>The post <a href="https://www.curveit.com/wifi/wifi-security-compromise/">WiFi Security Compromise</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Researchers have detected a vulnerability in WiFi security, through which WiFi Protected Access II (WPA2) connecting traffic can be manipulated putting devices at risk of hacks. It concerns the authentication system which is widely used to secure wireless connections.</p>
<p>Watch this <a href="http://www.bbc.co.uk/news/technology-41635516" target="_blank" rel="noopener noreferrer" data-cke-saved-href="http://www.bbc.co.uk/news/technology-41635516">BBC News video</a> for a simple explanation of the issue.</p>
<p>Since WPA2 is a protocol that secures all modern protected WiFi networks, laptops, desktops, phones, and other devices that support WiFi, are likely affected. Major developers, including Microsoft® and Google®, have stated they will be releasing patches soon.</p>
<p>&nbsp;</p>
<h2>Action for WiFi Security</h2>
<div>
<p>Simply changing WiFi network passwords is not going to help – software and firmware will need to be updated to workaround this deep design flaw.  The weaknesses are in the WiFi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available.</p>
<p>Understand what devices are present in your network, and be prepared to patch them as fixes become available. As a best practice, it is critical you have a <a href="https://www.curveit.com/services/it-support/it-support/" rel="">proactive patching program</a> in place.</p>
<p>Curve IT will be conducting the required patching for contracted devices as soon as the fixes become available.  We will be in touch with all clients to advise on specific patches your company may require.</p>
<p>If you&#8217;re concerned about your WiFi connection, please do get in touch.</p>
</div>
<div>
<p>Call 01273 806 220</p>
<p>Email <a href="mailto:support@curveit.com?subject=Curve%20IT%20scheduled%20maintenance" target="_blank" rel="noopener noreferrer" data-cke-saved-href="mailto:support@curveit.com?subject=Curve%20IT%20scheduled%20maintenance">support@curveit.com</a> or <a href="mailto:servicedesk@curveit.com?subject=Curve%20IT%20scheduled%20maintenance" target="_blank" rel="noopener noreferrer" data-cke-saved-href="mailto:servicedesk@curveit.com?subject=Curve%20IT%20scheduled%20maintenance">servicedesk@curveit.com</a></p>
</div>
<p>The post <a href="https://www.curveit.com/wifi/wifi-security-compromise/">WiFi Security Compromise</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Curve IT News &#8211; May</title>
		<link>https://www.curveit.com/news/curve-news-may-2017/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=curve-news-may-2017</link>
		
		<dc:creator><![CDATA[wandcadmin]]></dc:creator>
		<pubDate>Mon, 26 Jun 2017 10:56:10 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[BHAFC]]></category>
		<category><![CDATA[brighton]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Events Wifi]]></category>
		<category><![CDATA[it news]]></category>
		<category><![CDATA[Outdoor Wifi]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Seagulls]]></category>
		<category><![CDATA[Spiegeltent]]></category>
		<category><![CDATA[Temporary Wifi]]></category>
		<category><![CDATA[wannacry]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=1602</guid>

					<description><![CDATA[<p>Curve IT newsletter May 2017 - Cyber security and latest WiFi installations</p>
<p>The post <a href="https://www.curveit.com/news/curve-news-may-2017/">Curve IT News &#8211; May</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Read our May 2017 newsletter <a href="http://mailchi.mp/61b8cbb95da2/curve-it-news-cyber-security-and-wifi-installations-178747">here</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.curveit.com/news/curve-news-may-2017/">Curve IT News &#8211; May</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting your business from ransomware attacks</title>
		<link>https://www.curveit.com/it-support/security/protecting-business-ransomware-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-business-ransomware-attacks</link>
		
		<dc:creator><![CDATA[wandcadmin]]></dc:creator>
		<pubDate>Wed, 17 May 2017 13:08:15 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[bitdefender]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[protect from ransomware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[wannacry]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=1251</guid>

					<description><![CDATA[<p>We explain what ransomware is and how we can protect your business from an attack</p>
<p>The post <a href="https://www.curveit.com/it-support/security/protecting-business-ransomware-attacks/">Protecting your business from ransomware attacks</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Cyber Security</h1>
<p>Following last week’s global WannaCry cyber-attack we have been busy monitoring our clients’ IT systems to ensure that they have not been affected by the ransomware and of course, protecting them from further attacks.</p>
<p>We just wanted to remind you that the best way to steer clear of ransomware is to use your common sense and be vigilant.</p>
<ul>
<li><strong>Do not open email attachments from senders you don&#8217;t recognise even if they look very convincing</strong></li>
<li><strong>Avoid clicking links on dubious-looking websites.</strong></li>
</ul>
<h3>What is Ransomware?</h3>
<p>Ransomware is a malicious program that runs silently in the background encrypting your computer and your IT network until a ransom is paid via an untraceable currency, there is also no guarantees your files will be unencrypted even if the fee is paid.&nbsp; It is not new but the scale of the WannaCry malware attack is unprecedented.&nbsp; So far the estimate is 200,000 victims in 150 countries.</p>
<h3>How do I get infected?</h3>
<p>As with most forms of malware, the primary source of infection is an email attachment or malicious link. The senders use tricks to get you to open the attachment, such as pretending that it&#8217;s an invoice for something you&#8217;ve bought from a reputable company. This tactic preys on your fear of being charged for an item you didn&#8217;t buy, so that you&#8217;ll open the invoice without thinking about it.</p>
<h3>Is it common?</h3>
<p>Yes it is, and it’s on the increase.&nbsp; According to the latest <a href="http://bit.ly/itevolution398" target="_blank" rel="noopener noreferrer">IT Threat Evolution report from Kaspersky Lab</a>, from January to March 2016, ransomware attacks were recorded in 114 countries with more than 370,000 people targeted.&nbsp; 17% of which were in the corporate sector. The figures showed 30% more attacks than recorded in the previous quarter and this growth is showing no signs of slowing.</p>
<p><strong>&nbsp;</strong></p>
<h1>How do we protect your business?</h1>
<h3>Installing updates and patches</h3>
<p>We regularly update our clients’ software, servers and devices, we recommend operating the latest systems to provide a layer of protection.</p>
<h3>Firewalls and anti-virus</h3>
<p>We also make sure that firewalls are installed and kept up-to-date as well as anti-virus software.</p>
<p>If you haven’t already got it, we can install our recommended software security suite, Bitdefender, that protects your device from the most common types of ransomware.</p>
<h3>Back-up data</h3>
<p>We conduct regular data back-ups for your business to ensure that you can restore your files in the unlikely event that you are infected.</p>
<p>&nbsp;</p>
<p>We can carry out an assessment over&nbsp;your entire network to check you’re fully protected.</p>
<p>More information <a href="https://www.curveit.com/services/it-support/it-security/">here</a> about our IT Security services. &nbsp;If at any time you’re concerned about your cyber security, please just give us a call 01273 806220.</p>
<p>The post <a href="https://www.curveit.com/it-support/security/protecting-business-ransomware-attacks/">Protecting your business from ransomware attacks</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Identify a Spoofing Attack or Phishing Email</title>
		<link>https://www.curveit.com/it-support/security/identifying-phishing-emails/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=identifying-phishing-emails</link>
		
		<dc:creator><![CDATA[wandcadmin]]></dc:creator>
		<pubDate>Wed, 02 Mar 2016 20:29:35 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Curve IT]]></category>
		<category><![CDATA[Curve IT Services]]></category>
		<category><![CDATA[Identify phising emails]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[IT Support Brighton]]></category>
		<guid isPermaLink="false">https://www.curveit.com/?p=1</guid>

					<description><![CDATA[<p>Here are our tips on how to identify and deal with spoof emails</p>
<p>The post <a href="https://www.curveit.com/it-support/security/identifying-phishing-emails/">How to Identify a Spoofing Attack or Phishing Email</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our team at Curve IT get quite a few calls from our clients about suspicious emails they have received.  We thought it might be useful to put together our IT advice and knowledge in a blog post.  While some of the following points may be benign when they appear on their own, look out for a cluster of a few of these appearing on the same email, and if in doubt don’t act on it.  You can always contact us at Curve IT for support you may need.</p>
<h3><strong>Verify by Phone</strong></h3>
<p>We advise all our customers to <strong><u>NEVER</u></strong> send a significant amount of money anywhere based on an email alone. Always take the time to verify the payment by phone with the person concerned prior to performing a bank transfer.</p>
<h3><strong>Don’t Trust the Display Name<img decoding="async" class="wp-image-950 alignright" src="https://www.curveit.com/wp-content/uploads/2016/03/Phishing-emails-Display-name.png" alt="" width="237" height="181" srcset="https://www.curveit.com/wp-content/uploads/2016/03/Phishing-emails-Display-name.png 464w, https://www.curveit.com/wp-content/uploads/2016/03/Phishing-emails-Display-name-300x229.png 300w" sizes="(max-width: 237px) 100vw, 237px" /></strong></h3>
<p>To check the legitimacy of an email on your Outlook on PC, hover over the sender’s email address, click the down arrow on the right hand side of the window and you should see something like the image to the right. Scammers try and clone themselves as internal staff members to try and convince users of their legitimacy. If staff members get their personal e-mail accounts hacked, then scammers may route through their e-mails to find contacts they can pry on. We would always suggest changing any passwords on a regular basis especially around any suspicious activity.</p>
<h3><strong>Don’t Click Links</strong></h3>
<p>Hover your mouse over any links in an email. If the link looks weird to you, don’t click it. If you&#8217;re a client of ours, forward the email to us and ask the team to double check it if you’re not sure – we’re always happy to help you avoid a hack attack!</p>
<h3><strong> </strong><strong>Check for Spelling Mistakes</strong></h3>
<p>Commas in the wrong place are a dead giveaway that an email can’t be trusted. If you see a few errors or the English reads strangely, please be extra vigilant. Report anything suspicious to your IT contact.</p>
<h3><strong> </strong><strong>Beware of Urgent Language in the Subject Line</strong></h3>
<p>Phishing attacks often try to get you to rush or feel scared as it prevents the unwary from properly considering whether an email is genuine.</p>
<h3><strong>Beware of Unexpected Invoices and Attachments</strong></h3>
<p>Viruses are most often spread via an innocent word document or image file; however, the attacker relies on you downloading then opening the attachment. If you see something unexpected written in bad English, please call the sender to confirm the legitimacy.</p>
<p>Most antivirus and antispam software will detect and remove infected e-mails but occasionally something slips through.</p>
<p>&nbsp;</p>
<p>Further information about Curve IT&#8217;s <a href="https://www.curveit.com/services/it-support/it-security/">support service </a>and security recommendations.</p>
<p>The post <a href="https://www.curveit.com/it-support/security/identifying-phishing-emails/">How to Identify a Spoofing Attack or Phishing Email</a> appeared first on <a href="https://www.curveit.com">Curve IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
