|Q: How do I start service with
|A: An integralink sales
associate would contact you within 24 hours to schedule a meeting
with an IntegraLink network engineer. The engineer will evaluate
your needs and structure your network, outlining your hardware
requirements, as well as your bandwidth preferences.
|Q: I need my information secured
so no one can access it, can integralink do that?
|A: Yes, we offer a great
deal of managed services from local area networking to operations
support, as well as many others. integralink has several levels
of security you can choose from. Depending on your requirements
and situation, we can build a security structure for you..
|Q: What hardware would I need
to buy bandwidth from integralink?
|A: You would not have to
buy any hardware at all. We will provide you with pre-configured
Cisco® routers to suit your specific application. Other hardware
would be determined based on your bandwidth requirements. There
are no hidden costs, the engineer and sales associate state
all costs to you.
|Q: Besides bandwidth, what does
|A: integralink provides
full-scale solutions for your business. We offer not only bandwidth,
but also full security solutions, managed services such as Microsoftâ
operating system support, email support, and hardware support.
We can also add to or rebuild your current physical network
|Q: I have heard the term encryption.
What does it mean?
|A: Encryption is the use
of a complex mathematical algorithm based on large prime numbers
to scramble or “encrypt” your original data or message that
is called “plaintext” into “ciphertext.” The person holding
the decryption key, the intended recipient, unscrambles or “decrypts”
the ciphertext back to plaintext. This is usually a transparent
process, meaning that the sender and the recipient do not see
|Q: My company isn’t connected
to the Internet. Should I be concerned about my system’s security?
|A: Yes. Approximately 70%
of network attacks originate from inside the company or network.
The attackers can be present or former employees unhappy with
the company and a mind set on revenge, or even someone working
for competitors out to obtain details on your company.
|Q: If I have a firewall in place,
why would I need an Intrusion Detection System?
|A: A firewall should be
your first line of defense, but not your entire information
security system. A firewall controls data coming in and out
of your network through pre-determined definitions, keeping
an attacker from penetrating your systems - but it is not 100%
secure. An Intrusion Detection System (IDS) is a process that
can identify and respond to malicious activity against your
network. It can be active, allowing you to prevent and stop
attacks, or it can be passive, by monitoring and logging the
activity in an audit log.
|Q: What is a Denial of Service
|A: A Denial of Service
attack denies the users of a system access to and/or use of
that system. It is one of the most common attacks and can be
just a nuisance or part of a larger, more sophisticated system
attack that can render it useless for days or even weeks
|Q: Is there any way to ensure
that we are safe from attack?
|A: No, regardless of the
security measures you may now have in place. The best thing
that you can do is to take a proactive approach to your security
program through regular testing and an eye to emerging security
technology, make it a top priority and minimize the risk.
|Q: We upgraded our security
system a few years ago. We don’t feel that we are at risk, so
why should we feel the need to review what is working just fine
|A: Do not be so sure. New
technology is introduced constantly, and if you can get it,
so can unauthorized users of your system. In fact, it is quite
possible that an intruder has more advanced technology than
you have, especially if your security system has not been upgraded
within the past one to two years. Do not feel alone. Even firms
who are knowledgeable about information security have, either
willingly or unwillingly, placed their security needs on the
“back burner” due to budget constraints and other issues, and
subsequently are vulnerable to penetration of their systems.
|Q: We’ve never had a problem
with someone attempting to penetrate our system. Why should
we be concerned now?
|A: Just because you believe
a penetration to your systems has not happened yet does not
mean that it will not occur in the future or that it has not
happened already. The proliferation of the Internet, the increased
sophistication of network systems, and our interdependence on
a world economy and the systems that support it place every
network at risk now more than ever.
|Q: What is the difference between
a basic scan, remote audit, and a penetration test?
A: A basic scan provides a high-level quality assessment
of the level of security risk that may exist in an organization’s
external system. The scan provides a simulation as to how
someone without any knowledge of your organization or computer
system might attempt to penetrate your systems. InterNascent
scans all the Internet Protocol (IP) addresses in your system,
searching for the most prevalent vulnerabilities.
A remote audit consists of a detailed analysis of the level
of security present within your Internet connection and your
external system. We identify and assess vulnerabilities and
risks to your system. A Denial of Service Attack may be a
part of this audit.
A penetration test simulates an attack by an intruder who
is attempting to determine whether any potential weaknesses
exist in your system’s defenses. As part of the test, we evaluate
Web-based applications and authentication methodologies, including
a configuration test of the Web server, evaluation of file
system security, and other tests. A Denial of Service Attack
test may also be included with the penetration test.
Using the most advanced software technology, tools, and equipment,
we perform all of these tests multiple times in order to ensure
accurate and comprehensive results.