The Evolution of Cybersecurity
19th March 2025
Having recently celebrated my 15th anniversary at Connexis, I've witnessed significant changes in the technology industry, particularly in cyber security. When I began as an apprentice telecommunications engineer, security was a minor consideration in new solutions. Back then, phone hacking was a concern, but telecoms were largely isolated
from IT infrastructure, making cyber security less of a priority.
The landscape shifted dramatically with the advent of VoIP. In its infancy, I was involved in responding to a major security breach where attackers logged in to remote soft phone accounts and racked up a huge phone bill overnight. This incident was a wake-up call, highlighting the critical importance of cyber security and igniting my passion for the field.
In the years that followed, my experience helped secure our customers; telephony systems. I encountered numerous poor practices from competitors and had to educate customers; IT providers on necessary protections. This realisation led Connexis to focus on providing comprehensive cyber security solutions alongside communication services, addressing the gaps left by other IT providers.
Today, security is paramount for all technology providers. Everything from video surveillance systems to EV chargers are connected to data networks. Ensuring the security of these devices is crucial. Are providers keeping their software up to date? Could your smart fridge be an open door to your network?
At Connexis, we advocate a Defence in Depth approach to cyber security. No single security control is foolproof, but layering defences significantly reduces the likelihood of a successful attack. Here are some key components:
Perimeter Firewalls: Despite the rise of remote working and cloud computing, advanced firewalls remain essential. As a WatchGuard Gold Partner, we use their Fireboxes as a first line of defence for our customers, filtering both incoming and outgoing traffic, decoding encrypted traffic for inspection, and using advanced technology to detect viruses and zero-day attacks.
Network Segmentation: Your network should be divided into multiple virtual networks, known as VLANs, to keep your servers and other critical infrastructure separate from your PCs and your mobile devices. This limits access to only what is needed. Guests and smart devices should be on their own VLANs with no access to anything else on the network.
Endpoint Protection: With the growth of remote work, devices outside the network perimeter need robust protection. WatchGuards EPDR (Endpoint Protection, Detection and Response) service combines traditional anti-virus with AI, heuristics and Zero Trust classification of applications, ensuring only known good applications run on devices. This has been recently enhanced by XDR. ThreatSync Core is a WatchGuard Cloud service that provides eXtended Detection and Response (XDR) technology for WatchGuard Firebox and EDR products. It is part of WatchGuards Unified Security Platform, and provides centralised alert correlation, workflows, and AI-remediation orchestration services for different WatchGuard products.
Password Hygiene: Strong passwords are fundamental. Even the best security systems are vulnerable if passwords are weak or reused. We partner with Keeper to help customers generate and store strong passwords securely. Combined with WatchGuards Multi-Factor Authentication (MFA) solution, AuthPoint, accounts are protected from persistent attackers.
Cyber Essentials: Achieving Cyber Essentials and Cyber Essentials Plus certification validates your cyber security posture and demonstrates your commitment to security to customers and suppliers. Connexis can help identify and address security gaps, guiding you through the certification process with our assessment partner.