More stories

  • in

    NSW Police using artificial intelligence to analyse CCTV footage

    Image: Getty Images/iStockphoto
    The New South Wales Police Force is in the process of bringing its back-end into the 21st century, turning to Microsoft and its Azure cloud platform for help.According to Microsoft, the force is retiring, re-architecting, or replacing over 200 legacy systems with cloud-based systems. Part of this transformation is changing the way the force analyses CCTV footage.Labelled as the “AI/ML-infused Insights policing platform”, the system essentially speeds up the processing of data. In one example, NSW Police collected 14,000 pieces of CCTV as part of a murder and assault investigation and analysed it in a manner faster than it previously could.”The AI/ML infused Insights platform ingested this huge volume in five hours and prepared it for analysis by NSW Police Force investigators, a process that would otherwise have taken many weeks to months,” Microsoft said in a case study prepared alongside NSW Police.”Detectives were able to then within days piece together the time sequence of events, movements, and interactions of the person of interest as well as overlay this onto a geospatial platform, visualising the data for detectives and aiding in the preparation of the brief of evidence for Courts.”Leveraging Microsoft Azure cognitive technologies, machine learning, and deep learning capabilities, NSW Police has been able to train the system on image classification allowing it to interpret petabytes of CCTV footage automatically and at speed provide rapid access to leads that officers can pursue to ultimately solve crime faster.”Must read: Human Rights Commission calls for a freeze on ‘high-risk’ facial recognition

    The platform can also turn voice to text, allowing for the speedy transcription of police interviews, and can also stitch together CCTV with dash cam footage and then search for objects, including overlaying this on a geospatial solution, the pair added.”Using computer vision it can search to recognise objects, vehicles, locations, such as a backpack, or a tie, or type of shoes a person of interest might be wearing,” NSW Police CITO and executive director of digital technology and innovation Gordon Dunsford said.”The system has been designed with ethics front and centre, and in consultation with privacy experts with a particular focus on avoiding bias,” Microsoft added.Insights is currently hosted internally, but will “shortly” migrate to the cloud. NSW Police, however, is already using a containerisation strategy to parcel up data that needs to be interpreted rapidly, and sending that to Azure for processing.Elsewhere, the force is also working on its Integrated Policing Operating System (IPOS), which will replace the existing 27-year old central database and be used to manage all the data from operations including triple zero calls, arrests and charges, firearms, criminal investigations, forensics, complaints, and public reports.IPOS is based on Mark43’s public safety software.IPOS also provides the force with a single view of a person of interest and can be viewed on an officer’s MobiPol mobile devices. “It can also provide access to important additional information; for example, alerting police to the fact that the address where they are going to apprehend someone is located next to another house where residents are known to be antagonistic to the police through its geofencing capability,” Microsoft added.See also: How Victoria Police handled the Bourke Street incident on social media (TechRepublic)Dunsford said that, at present, officers share MobiPols, but with IPOS there are plans to equip every officer with their own device and access to IPOS.NSW Police also has plans to replace the legacy data store systems with the Digital Evidence Cloud, and has built a small-scale capability that it has trialled with NSW Police’s Forensics Command.Dunsford also wants to understand how low earth orbit (LEO) satellites could be used to support police; how data from the Integrated Connected Officer program which collects data from an officer’s firearm, taser, car, and body worn camera can be ingested into Insights; and how drones could be deployed to collect video that could help identify potentially dangerous situations.Advanced AI and machine learning could, he thinks, be used to train systems to identify everything from the colour, make, and model of vehicles, to a backpack in a crowded street, to finding a particular individual based on their unique gait.In June 2020 Microsoft said that it would not sell or deploy facial recognition to police services.RELATED COVERAGE More

  • in

    Innovation Oz Style: Take a world-leading secure kernel and kick it to the kerb

    CSIRO chief Dr Larry Marshall trying to explain basic science to a climate science-denying Senator
    Image: APH
    As with many things, timing is everything, and in the weeks after word drifted out that Australia’s Commonwealth Scientific and Industrial Research Organisation’s (CSIRO) Data61 was binning its secure microkernel research, the world of cyber attacks manifested in the real world in new ways. From oil pipelines, to meat works, to a more traditional Russian-backed phishing campaign, the cyberdial has been turned up and the frequency of attacks, particularly in the ransomware space, has hit deluge-like levels. And yet, while the torrent of malware is far from unexpected, people lining up with jerry cans and fighting with each other because someone might have clicked on a dodgy email certainly is. The need to develop a better foundation, and more secure ways of computing, would appear to be more necessary than ever — but not at the CSIRO, where artificial intelligence is the order of the day. “We think Australia needs artificial intelligence for industry 4.0, for our sovereign capability, for digital agriculture, and to deal with environmental hazards,” CSIRO CEO Dr Larry Marshall told Senate Estimates on Thursday night. “Really putting digital at the heart of Australia’s resilience and recovery as we build back.” One of the problems with the seL4 microkernel and the Trustworthy Systems team that developed it, according to Marshall, was that it supposedly did not provide enough “national benefit”.

    “So it’s difficult to see an opportunity to build an industry in Australia, or to derive a national benefit from that technology, and given priorities are artificial intelligence, we chose to pursue that and focus our resources where we thought we could drive greater national benefit,” Marshall said. “The challenge with that technology … it’s very mature and it is open source.” During the hearing, Marshall waved articles listing CSIRO’s high ranking among global research organisations, but seL4 has been similarly regarded as first class research. One has to walk a long way to find a mathematically proven secure kernel. “This is an instance of Aus policy directly leading to undermining Australian cybersecurity,” security researcher Vanessa Teague said in reaction to CSIRO’s decision. “It’s hard to think of better world-leading Aus cybersecurity research than [seL4 Foundation].” Chair of the seL4 Foundation Gernot Heiser rebutted CSIRO claims that seL4 was mature technology in a blog post. “The group is not accidentally called ‘Trustworthy Systems’ (and not, say, the ‘seL4 Research Group’). seL4 is only the starting point for achieving trustworthiness in computer systems. It’s as if over 100 years ago people said combustion engines are a solved problem once it was shown they could power a car,” he wrote. “Fact is that, while seL4 is mature enough to be deployed in the real world, there’s plenty of fundamental research work left on seL4 itself, and there is far more research left on how to achieve real-world trustworthy computer systems. It’s not that just sprinkling a bit of seL4 fairy dust over a system will make it trustworthy.” Heiser laid out the work to be done on temporal isolation of processes, especially on systems where critical real-time workloads run at the same time, but he added the research was under threat as the CSIRO had handed back some money from the US Air Force. The University of New South Wales has backed Trustworthy Systems until the end of 2021, with Heiser stating it gives some breathing space to “line up more pathways”. In recent years, the push has been on in Australia to commercialise the country’s research, and this seems to be the rock that Trustworthy Systems has tripped on. “Unfortunately that technology was licensed [to Qualcomm] for a one-time fee,” Marshall said. “And when I say unfortunately, that technology has gone through two billion mobile devices, but unfortunately, there’s no ongoing royalty arrangement with that deal that was done back in at that time.” Keep in mind that the CSIRO loves royalty payments and will sue to ensure it gets its cut. The organisation boasts it got AU$430 million in settlements over its Wi-Fi patents. The open-source nature of seL4 does not lend itself to this type of outcome. Marshall said it would be great if a company was spun out around the work and if it could figure how to make money. “Our conclusion was that’s not really feasible in Australia, which is why we chose to discontinue the work,” he said. Given the current environment, where Australian politicians are calling on ASD to use its classified powers to blast away ransomware groups, and who knows what the political response from Moscow, Pyongyang, and Beijing would be to that; local law enforcement continue to say dumb stuff about encryption; and Australia’s strategic rivals are using current weaknesses to be downright awful to parts of their population, a little research on the defensive side of computing would be useful. The seL4 kernel isn’t going to be powering any desktop or server near you anytime soon, but it could go some way to making IoT devices look less like Swiss cheese to bad actors. It could even end up being the underpinning of CSIRO’s “artificial intelligence for industry 4.0” systems — whatever they are — or help inform the new OSes that are being developed. In a worst case scenario for CSIRO where it kept seL4 but it didn’t yield rivers of gold, it could still push research in vital areas of cybersecurity, increase Australia’s research reputation, and show that the nation isn’t completely full of the cyber ignorant. But alas, the world of secure kernels is not as sexy and pitch-friendly as the buzzword-laden AI realm, and Trustworthy Systems has been forced to shift from a national research organisation that has been subject to funding cuts, into a university sector that has seen far more drastic cuts. For our national benefit, hopefully the upcoming AI research yields more than a better chatbot. ZDNET’S MONDAY MORNING OPENER  The Monday Morning Opener is our opening salvo for the week in tech. Since we run a global site, this editorial publishes on Monday at 8:00am AEST in Sydney, Australia, which is 6:00pm Eastern Time on Sunday in the US. It is written by a member of ZDNet’s global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and North America.  PREVIOUSLY ON MONDAY MORNING OPENER: More

  • in

    On a quest through uncharted territory

    In his research and in other parts of life, Ankur Moitra likes to journey off the beaten path. His explorer mentality has brought him to at least one edge of the unknown — where he seeks to determine how machine learning, used in increasingly diverse and numerous applications, actually works.

    “Machine learning is eating up the world around us,” says Moitra, a theoretical computer scientist and associate professor in MIT’s Department of Mathematics, “and it works so well that it is easy to forget that we don’t know why it works.”

    Moitra says he is attempting to put machine learning “on a rigorous foundation,” analyzing the methods that are currently used to put it into practice. He is also, he says, “trying to design fundamentally new algorithms that can expand our toolkit. As a byproduct, algorithms we understand rigorously can also aspire to be ones that are more robust, interpretable, and fair.”

    Moitra was raised to be an independent thinker. Growing up in Niskayuna, New York, he was surrounded by a family of computer scientists. His parents encouraged him, however, to explore his many other interests.

    “I decided pretty early on that computer science was definitely not cool,” he says. “But the joke was on me. Eventually I came to discover computer science and mathematics on my own and fell in love with them.”

    Moitra received his bachelor’s degree in electrical and computer engineering from Cornell University in 2007. He earned his master’s and PhD from MIT in computer science, in 2009 and 2011, and joined the MIT faculty in 2013. Moitra received tenure in 2019, and is currently a principal investigator in MIT’s Computer Science and Artificial Intelligence Laboratory and a core member of the Statistics and Data Science Center.

    Throughout Moitra’s education, his independence only grew. He discovered that not only did he want to come up with his own answers involving algorithms and their connections with such areas as machine learning, statistics and operations research, he wanted to be the one formulating the questions.

    “I realized that I do my best research when I make up my own questions,” Moitra says, “and that’s a perfect fit for theoretical machine learning where we often don’t know where to begin.”

    Moitra says that in his approach to research, “every trick you can dream up is fair game. It doesn’t matter how ugly or complicated your proof gets.”

    His intellectual adventurousness has drawn the admiration of colleagues and mentors along the way. When Moitra won a David and Lucile Packard Fellowship in 2016, Professor Tomasz Mrowka said, “He is the dream colleague: He is deeply intellectually curious,” and referred to his “fundamental contributions to his discipline.”

    In his teaching, Moitra encourages his students to venture out of “safe areas where other researchers have laid the groundwork and asked the right questions that you’re now hoping to answer.”

    On the other hand, he tempers this free-ranging approach while teaching or giving talks: “I think about how simple I can make something, and whether there are some real-world examples that help drive it home.”

    This teaching approach lands well. In 2018, Moitra won a School of Science teaching prize for his graduate-level course 18.408 (Algorithmic Aspects of Machine Learning). His nominators called him an “inspirational, caring and captivating” teacher.

    Moitra says MIT is an excellent environment for him.

    “Everyone is brimming with energy, and excited to make the world a better place,” he says. “It’s infectious.”

    Between his teaching responsibilities and spending time with his wife and two children — with a little time out for playing or watching sports — Moitra’s schedule is full. Late at night, when he’s on his own, is when he does his best thinking, he says.

    “Once in a while I get so obsessed with a problem and feel like it’s so close to being solved that I just can’t sleep,” he says. “I stay up for hours pacing around the house. As a professor, your inbox is always flooded and your schedule is always jam-packed with meetings. But at night, no one needs you and everyone is sound asleep, and I can think deeply without any distractions.”

    It’s in those hours that Moitra can “venture into uncharted territory” and wander freely, sometimes making discoveries that become pivots to new areas of research.

    “There really are basic, fundamental questions out there that are exciting and that no one has dared to ask before,” he says. “And when you discover something new like that, it’s a special kind of joy when other people start to join you on your expedition.” More

  • in

    Most Brazilian companies lack cybersecurity teams

    Security teams are in place in less than a third of Brazilian organizations, even though most businesses frequently suffer cyberattacks, according to new research. Some 57% of businesses from the education, financial services, insurance, technology and telecommunications, health and retail are targeted by cybercriminals frequently, according to a survey by Instituto Datafolha commissioned by Mastercard.On the other hand, the study has found that only 32% of the organizations polled have dedicated cybersecurity teams. While 80% of respondents claimed digital security matters are important to them and most have some kind of plan in place to deal with potential cyberattacks, this is not among the budgetary priorities for 39% of those polled.

    Among the segments analyzed in the survey, financial services, insurance, technology and telecommunications are among the most prepared in terms of cybersecurity readiness. Conversely, the education and healthcare sectors are the most vulnerable. According to the survey, the areas most susceptible to hacker attacks are the finance department and customer databases. The Mastercard/Datafolha survey interviewed 351 decision-makers in Brazil in February 2021. The survey echoes the findings of a separate study on perceptions of cybersecurity risk in Latin America since the start of the Covid-19 crisis, carried out by consulting firm Marsh on behalf of Microsoft. Most Brazilian companies have not increased their investments in information and cyber security since the emergence of the pandemic despite an increase in threats, the study noted, adding that the majority of Brazilian companies invests 10% or less of their IT budget in that area. More

  • in

    FBI, DOJ to treat ransomware attacks with similar priority as terrorism

    The FBI and Justice Department upped the ante on the rhetoric around ransomware attacks on Thursday and Friday, telling a number of news outlets that cyberattacks will be treated with almost the same level of concern as terrorist attacks.Christopher Wray, the director of the FBI, compared the government’s fight against ransomware to the situation the country faced after 9/11 in an interview with The Wall Street Journal. He added that the FBI has identified nearly 100 different types of ransomware, each of which has already been implicated in attacks. He also took direct aim at the Russian government, singling them out for harboring many of those behind the different brands of ransomware. But he also revealed that the FBI has had limited success working with some private sector cybersecurity officials in obtaining encryption keys without paying any ransoms. The comments came after three significant developments in the government’s response to the recent wave of ransomware attacks on companies in critical industries like Colonial Pipeline and global meat processor JBS. Anne Neuberger, deputy assistant to the President and deputy National Security Advisor for Cyber and Emerging Technology, sent a letter to private sector leaders on Thursday urging them to prepare for potential attacks and implement a number of security measures to prevent an incident. Senior Justice Department officials then told Reuters that memos had been sent out to all US Attorney’s Offices explaining that ransomware attacks would be investigated in a manner similar to incidents of terrorism. Technology journalist Kim Zetter shared a snippet of a memo sent by Deputy Attorney General Lisa Monaco that said urgent reports should be filed whenever a US Attorney’s Office learns about a new ransomware attack. The memo adds that officials should notify a newly created ransomware task force about any new developments in cases, potential emergencies or incidents that will “generate national media or Congressional attention.”

    “Urgent Reports should be submitted, for instance, when a United States Attorney’s Office learns of a ransomware attack on critical infrastructure or upon a municipal government in their District,” Monaco wrote. Reuters reported that the new guidance also said senior Justice Department officials need to be notified of any cybercrime cases involving cryptocurrency exchanges, botnets, digital money laundering, illicit online forums, “bulletproof hosting services” and counter anti-virus services. Rep. Jim Langevin told ZDNet that the memo from Neuberger was a sign that President Joe Biden was taking the ransomware incidents seriously, but he urged the White House to give CISA more power to issue similar guidelines.”The advice in the White House memo is sound, and I hope corporate leaders will adopt a more risk-informed cybersecurity posture as soon as possible,” Langevin said. “However, I also hope the President will follow Congress’s direction and empower CISA to make similar recommendations moving forward.”Cybersecurity experts said that while the guidance from the White House was helpful, it did little to address the underlying problems thousands of organizations face when trying to protect themselves. Robert Haynes, open source evangelist with Checkmarx, said it was critical for organizations to identify the impact of the loss of different systems on their ability to operate. For most businesses, Haynes noted, the threat of a ransomware attack, the cost of the ransom itself and the huge impact on operations should be motivation enough to take these threats extremely seriously. “The primary focus needs to be on prevention, and then mitigation assuming total loss of systems. Leaders should be aware that the recovery time will involve rebuilding systems and restoring data, even with a successful recovery of encrypted files,” Haynes said. “The risks are real and the disruption, no matter how good your data protection solutions are, can be costly.”Dirk Schrader, global vice president at New Net Technologies, suggested the government find a way to make it a requirement for organizations to report any case of ransomware to authorities and strongly discourage ransom payments. But he noted that companies may not be willing to report a ransomware incident if that will delay the return to normal operations. Kevin Breen, director of cyber threat research at Immersive Labs, explained that valuable advice from the White House, like having offline backups, was nice to say but can cause friction within enterprises because they are typically hard to implement and costly. The same goes for other guidance shared by Neuberger like network segmentation. “If you’re not already doing it, implementation may be complex,” he said, adding that incident response tests will be key for preparing any organization for an attack.”These need to be done with a higher cadence than traditionally, and across the entire workforce to take into account the impact on technical, legal, communications and other cross functional teams.”The Justice Department’s efforts to create a centrally coordinated response will give authorities a deeper pool of evidence and data while also helping with the identification and targeting of the entire chain, Breen added, noting that it may also help add legislative teeth to mitigation efforts.Breen went on to say that the other measures being taken by the FBI and Justice Department were happening because ransomware gangs had “poked the sleeping giant one time too many.” More

  • in

    Best internet provider in the UK 2021: Top ISP picks

    Picking an internet service provider (ISP) is a big decision for small businesses. Once the ISP is in, you’re stuck with them for upwards of a year, living with their claimed speeds, actual speeds, contract pricing and price changes after the contract period ends. With millions of people working from home over the past year, the importance of home broadband services has elevated from ‘nice-to-have’ for Netflix and Amazon Prime to absolutely essential for small and medium business and SOHO operators.  Spotty broadband directly impacts income, so it’s good to have backup connectivity options like a 4G fallback when things go awry. And when you’ve got deadlines, the last thing you want is to be waiting for an ISP’s support to debug and solve your broadband problem.  That means when hunting down the best business broadband offer, businesses need to look beyond price and speed, and also assess whether the ISP offers good service level agreements (SLAs) and reliable speeds. Reliability is critical.  The biggest ISPs in the UK include BT, TalkTalk, Virgin Media O2, Sky, and Vodafone. According to UK telecoms regulator Ofcom, all the major ISPs had relatively high levels of customer service satisfaction. TalkTalk, a challenger brand to BT, had the lowest satisfaction at 77% in Ofcom’s survey, but it also offers some respectable deals and a broad range of speeds and support options for businesses.    All the download and upload speeds for various business broadband products listed in this guide are on an ‘up to’ basis, which means there’s no guarantee these speeds will be available all the time. Speeds are reported as download/upload figures in Mbps.    

    Deals to match any business needs

    Shutterstock

    TalkTalk, the UK’s fourth-largest ISP, has four business broadband deals ranging from £15.95 a month with speeds up to 18Mbps through to Dedicated Leased Lines with 1 Gbps speeds — with around the clock UK support and an SLA fix times from five hours.  The top dedicated leased line from TalkTalk, Ethernet Access Direct, is available from £274 a month and offers up to 1Gbps symmetrical speeds, no installation fee on a three-year contract, and a five hour fix time SLA.  The Ethernet First Mile package, from £150 a month, includes up to 20Mbps symmetrical speeds, while the Ethernet over Fibre deal from £70 a month offers up to 76Mbps download speeds.For businesses that don’t need SLAs and 1 Gbps speeds, TalkTalk offers a much cheaper Business Ultrafast Fibre 150 package for £25.95 per month on a 24-month contract average speeds of 145/25Mbps. There’s also the Business Ultrafast Fibre 300 for £30.95 a month that features average speeds of 290/40Mbps. These seem like sensible choices for most small businesses.The £15.95 Standard Business Broadband on a 12-month contract is an attractive starting price but only offers speeds up to 18Mbps. As more jabs roll out and businesses begin to reopen, TalkTalk has a range of fibre ‘reopening’ options with three months free, ranging from 100/20Mbps download/upload speeds for £29.95 a month to a 900/115Mbps package for £59.95 a month — these are 24-month contracts.  Pros:   A broad range of price points speeds.   An option with symmetrical speeds.   For those that pay, a five hour fix time promise.   Competitive pricing.Cons:   Ofcom found it had the lowest level of customer satisfaction amongst big ISPs.   It has a TrustPilot rating of just 2.5 out of 5.

    View Now at TalkTalk

    It’s premium and pricey but has the broadest coverage

    Shutterstock

    Incumbents are hard to avoid even with healthy competition and BT has the broadest coverage.BT’s business broadband deals start at 76/19Mbps for £35.45 a month on a 24-month contract. Most of the business broadband deals offer 76Mbps download speeds, but BT also has its Full Fibre product with speeds from 76Mbps to 900Mbps.  A lot of BT’s business broadband deals bundle in other products, such as a digital phone line and mobile phone plan (including phones like the Samsung Galaxy A42 5G and the iPhone 12 Mini 5G), leveraging its growing 5G mobile network under the EE brand — which BT bought for £12.5bn in 2015. One advantage of BT is that if there is a broadband outage, it will automatically switch to EE’s 4G network. BT boasts 24/7 support, and a solution for wi-fi blackspots around a building for £7 extra a month. While 76Mbps is not the fastest broadband service it does qualify for super fast broadband — many small businesses and retailers will find this sufficient. BT’s top listed offer is for superfast broadband and phone for £35.45 a month, which includes a digital phone line, the always-connected 4G EE guarantee, and a guarantee that prices won’t change over the course of the contract. Fortunately, for finance, tech, digital agencies and media companies, BT has much faster packages:Full Fibre 150 with 152/29Mbps speeds costs £42.95 a month.Full Fibre 300 costs £47.95 a month.Full Fibre 500 costs £59.95 a month. But for businesses that need extra bandwidth and speed, BT’s fastest offer is the Full Fibre 900 with download speeds of 900Mbps for £64.95 a month.Pros:   A broad range of products.   4G EE backup could be handy.    Broadest coverage in the UK. Cons:   Notable more expensive than business broadband rivals.    It has a TrustPilot score of just 1.3 out of 5.  

    View Now at BT Full Fibre

    Decent speeds at low prices

    Shutterstock

    Virgin Media, the third-largest provider, has a business broadband product called Voom with packages up to 500/35Mbps. All of the Voom packages are available as 24-month contracts and range from £32 to £62 a month. Higher-end packages include dynamic or static IP options and faster resolution times:Voom Fibre 1 costs £32 a month with download speeds up to 350/7Mbps. It promises customers a fix within 48 hours of the first issue report. Voom Fibre 2 costs £47 a month, has 350/15Mbps upload speeds, and a 24 hour resolution time.Voom Fibre 3 for £50 a month includes 350/20Mbps speeds, up to five static IPs and a 24 hour resolution time.  The premier Voom 500 for £62 a month includes 500/35Mbps speeds, up to five static IPs, and a 12-hour turnaround for resolving problems. Customers can add 4G as a backup for £7 a month to all these packages for occasions when the point of service (POS) terminal needs to be up and running during an outage.Pros:   Competitive prices for speeds.   Simple packages and a 4G backup option.   A 12 hour fix time for Voom 500 customers.Cons:   No Gigabit broadband option.   The SLA only applies from Monday to Saturday and excludes bank holidays.   Smaller coverage than BT, but you can use a postcode checker.

    View Now at Virgin Media

    Reasonable prices, but limited speed choices

    Shutterstock

    Sky’s Sky Connect business broadband offerings in terms of speeds look very much like BT’s. All three of its Sky Connect services have a 76/19Mbps service, unlimited data and a digital business phone line. All prices are available on a 24-month contract with phishing and malware protection, unlimited data, and a digital business phone line. Sky Connect has bundles are:The Advantage deal, at £39 per month, includes the aforementioned features, but not up to four digital phone lines. The Advantage Pro, at £55 per month, has the same but includes 4G backup and not four digital phone lines. The Advantage Max, at £95 per month, includes all features plus up to four digital lines. It also offers a 30-day money-back guarantee if a business customer decides they don’t like the service. Sky Connect lacks higher speed options, but the pricing is simple and with a 30-day return period, it could be an attractive choice for many businesses.  Pros:   Competitive prices.   Simple packages.   A 4G backup option for those who need it.Cons:   No high-speed options.

    View Now at Sky Connect

    Cheap but slow speeds

    Shutterstock

    Plusnet sits within the consumer division of BT, but it does have an unlimited business broadband offer from just £17.50 a month. Plusnet is a budget ISP, and so it doesn’t offer many fancy extras while download speeds are limited to 18Mbps or 76Mbps. It is a 24-month contract, so you need to be sure that 18Mbps is enough for your business. However, Plusnet does offer an Unlimited Business Fibre deal for £22 with 76/18Mbps speeds. It probably won’t be for a digital marketing agency, but for a small retailer, 18Mbps download speeds might cut it. Plusnet users can download as much as they want, but there are none of the more sophisticated options like SLAs and symmetric speeds. It’s an offer that highlights that ‘you get what you pay for.’ Pros:   It’s a cheap service.   Includes line rental.   Unlimited data.Cons:   No high-speed options.   Basic support and service.

    View Now at Plusnet

    Which business broadband ISP should I choose?

    Keep an eye on the contract period and how much the costs change afterwards. In all cases, UK ISPs charge more for business broadband after the initial contract period. That means putting a note in your calendar a month before the contract is up to review the experience. While consumer broadband options plenty of speed choices and are generally cheaper, there can be a benefit to businesses of having better upload speeds — even if they’re not guaranteed speeds.  While some packages are simple with relatively low or even free setup costs, it is worth visiting the ISP’s website and finding out what all the costs are, including VAT and whether a phone line is an additional cost or included, as a digital phone line.  If you’re running a small retail outlet with a few POS machines, a cheaper basic broadband option will probably suit you. Most ISPs included here offer these entry-level products, but not all ISPs have SLAs or 4G backup options for when things go wrong. The question comes down to how important internet connectivity is to your revenues and operations.   

    How did we pick which ISPs to include?

    All the providers included in this round-up are national ISPs with broad coverage. Each ISP had specific business plans available and most of them had products and speeds that were suitable for a variety of small and medium businesses in different sectors. It may be worth checking regional ISPs too or those with less than national broadband coverage. 

    Independent ISP Zen Internet has business broadband offerings covering fast, superfast and ultrafast broadband, with a range of data usage packages with a static IP address. Its on-net reach covers over 500,000 postcodes, but customers need to use the postcode checker to see if they can get its service.     Zen’s entry-level product costs £27 a month and offers 10/1Mbps average speeds on a 24-month contract with the phone line included. It includes a free router and there is a “critical care” option for £27 that includes better support, 99% uptime and £25 service credit if fix times exceed 12 hours.The Business Fibre 2 product includes line rental and costs £46 a month, offering 66/17Mbps speeds on a 12-month contract with a £45 activation fee. It’s a Fibre to the Cabinet service. Zen’s faster costs £50 a month with a £50 activation fee and offers 150/25 Mbps speeds. Or there’s the Business Fibre 4 FTTP service from £57 a month with a £50 activation fee that features 300/50Mbps speeds and a free static IP address.  

    View Now at Zen

    ZDNet Recommends More

  • in

    Amazon Sidewalk is about infrastructure, not intrusiveness

    In my last column, I looked at three silicon providers developing low-power technology for the Internet of Things. But while the smart home has been the cradle of consumer IoT, it hasn’t evolved far beyond that, in part because of the high cost and power consumption of the cellular connectivity that might service consumer devices outside of the home. This has given rise to several low-power networking technologies such as LoRaWAN and GFSK that achieve longer range by operating at lower frequencies than today’s Wi-Fi.

    However, these technologies haven’t been adopted as broadly as LTE or Wi-Fi. The innovative team at Helium, for example, has enabled LoRaWAN proliferation by incentivizing consumers to purchase and host their own hotspots with cryptocurrency rewards. While the company has done a good job of expanding its ecosystem in the past year and is now expanding into offloading 5G network traffic, the proposition isn’t easy to convey to everyday users. E-scooter-on-demand provider Lime has been one of the few big consumer brands to bet on Helium’s network.Consumer IoT thus faces a classic chicken-and-egg dilemma, one that is targeted by Amazon’s new network initiative, Sidewalk. As its name suggests, Sidewalk addresses connectivity beyond the home, but not necessarily on the open road, at least initially. To do this, Amazon, like Helium, piggybacks a bit of traffic on consumers’ home networks. Unlike Helium, though, which requires consumers to purchase or build their own hotspots, Amazon can leverage select models of its mammoth installed base of Echo and Ring devices as gateways between technologies such as LoRaWAN or Bluetooth and Wi-Fi.Sidewalk is often described generically as a Wi-Fi sharing, but this is not about having your neighbor mooch your broadband to get their Netflix on. Sidewalk connections are limited to 80 Kbps, which is about 1.5x the peak download speeds of the final generation of dial-up modems (Team X2 Forever!). And Amazon caps the monthly amount of traffic per account to 500 MB, equivalent to about 10 minutes of high-definition video.Much of the concern surrounding Sidewalk has focused on security and privacy. However, improving the security and privacy of endpoint devices was a major part of its rationale. According to Manolo Arana, general manager of Sidewalk at Amazon, Sidewalk was developed to bring more consistency and raise the overall security level of the emerging class of IoT devices.Arana explains, “It is very difficult to find engineering talent and capabilities for any company in device security and hardware capabilities. Not all the hardware vendors are at the same level or make certain features available. As a consequence, we end up with disparity. Are you truly who you say you are? Is someone spoofing you?” He explains that device security involves multiple features, including the certificates on the device, anti-rollback (to manage OTA updates), and secure boot. The latter is required of Sidewalk-certified products as their chipsets support it.As my fellow ZDNet contributor Adrian Kingsley-Hughes explains in describing his decision to opt-in to Sidewalk, Amazon has developed three layers of encryption around Sidewalk’s IoT traffic. The first of these is a data layer that can be accessed only by the company deploying the application — say, a pet-finding service or a connected doorbell — that uses it. Amazon has no access to it.

    This brings up another Sidewalk paradox. Simply because the technology was incubated within the company’s devices and services group that is strongly associated with Alexa doesn’t mean that Sidewalk shares its business mode or data collection practices. Indeed, while it relies on consumer devices, Sidewalk is a B2B business that has more in common with AWS, infrastructure that Amazon extends to third parties. In fact, the first Sidewalk customers — Tile and Level locks — will be using the network before any Amazon endpoint devices.

    In the Amazon tradition, Arana keeps coming back to the customer. In Tile’s case, it’s easy to see how access to Sidewalk’s footprint provides a hedge in competing with the vast number of mobile devices controlled by a new competitor. And while all networks entail some security risk, Tile’s early embrace of Sidewalk represents a vote of confidence that Amazon can protect the location services company’s user data and privacy as well as speaks to Amazon’s incentive to preserve Tile’s trust. Sidewalk has also benefited from AWS’ extensive experience securing the data of some of the world’s largest enterprises.AirTags review: Tile trounced by the power of Apple’s Find My networkWhen Sidewalk gets turned on in select Amazon devices next week, it will mark a rare event: the near-instant activation of a new network with broad reach, one that can offer services such as item location, simplified device setup, and telematics, as well as potentially supporting whole new classes of devices focused on low-bandwidth media such as text and speech. Of course, everyone will have to decide if enabling Sidewalk is right for them. Consider, though, that Ring or Echo users already entrust Amazon with details of home conversations or images of themselves or their families.That said, as with many novel technologies, the cautious may hold back for a while. Arana accepts this and sees it as a challenge to improve Sidewalk’s participation value over time. That could entail new services and features, but it could also simply mean proving resilience in the real world. While Arana believes his team’s work should inspire consumer confidence, he joins with the realists within Amazon and its competitors in acknowledging that the quest to improve privacy and security will never end.PREVIOUS AND RELATED COVERAGEAmazon Sidewalk will create entire smart neighborhoods. Here’s what you should know Launching June 8 on Echo speakers, Ring products, Tile trackers and more, Amazon’s low-bandwidth internet-of-things network lets your smart home stretch beyond Wi-Fi range.Amazon’s Sidewalk network to launch this year with new devices, support from IoT chipset manufacturersThe Sidewalk protocol is part of Amazon’s effort to spur the development of low-cost IoT devices that don’t rely on a cellular connection.Do you trust Amazon to share your internet connection with others? How to opt out Amazon Sidewalk is a new service that shares your internet connection with others in your neighborhood to extend the range and reliability of Amazon Echo, Ring Security cameras, and Tile trackers. More

  • in

    Hackers use Colonial pipeline ransomware news for phishing attack

    Cyberattackers are now using the notoriety of the Colonial Pipeline ransomware attack to leverage further phishing attacks, according to the findings of a cybersecurity company. It is common for attackers to use widely-covered news events to get people to click on malicious emails and links, and cybersecurity firm INKY said it recently received multiple helpdesk emails about curious emails their customers were receiving. INKY customers reported receiving emails that discuss the ransomware attack on Colonial Pipeline and ask them to download “ransomware system updates” in order to protect their organization from a similar fate. The malicious links take users to websites with convincing names — ms-sysupdate.com and selectivepatch.com — both of which are newly created and registered with NameCheap. The same domain that sent the emails also controlled the links, INKY explained in a blog post. 
    INKY
    The people behind the attack were able to make the fake websites look even more convincing by designing them with the logo and images from the target company. A download button on the page downloads a “Cobalt Strike” file onto the user’s computer called “Ransomware_Update.exe.”In March, Red Canary’s 2021 Threat Detection Report listed “Cobalt Strike” as the second most frequently detected threat and the INKY report notes that Talos Intelligence found it was involved in 66% of all ransomware attacks in Q4 of 2020. Bukar Alibe, data analyst for INKY, said they began to see the phishing attack just a few weeks after news broke that the pipeline paid millions to the DarkSide ransomware group in order to restore the company’s systems.  

    “In this environment, phishers tried to exploit people’s anxiety, offering them a software update that would ‘fix’ the problem via a highly targeted email that used design language that could plausibly be the recipient’s company’s own,” Alibe wrote. “All the recipient had to do was click the big blue button, and the malware would be injected.”In addition to capitalizing on the fear around ransomware, the attackers made the emails and fake website look like it came from the user’s own company, giving them an air of legitimacy, Alibe added. The attackers were also able to get past many phishing systems by using new domains. 
    INKY
    “If it looks as if it was sent by the company itself (e.g., from HR, IT or Finance), does it in fact originate from an email server under the company’s control? If it looks like the HR or IT Departments but deviates from the norm, that should be a flag,” the blog post said. Alibe urged IT teams to notify employees that they will “not be asked to download certain file types” because these kinds of phishing emails seek to exploit employees desire to do the right thing by following purported security guidelines. Alibe noted that the attack was targeted toward two companies and said IT teams should expect more attacks along the same lines. “We would not be surprised if we see attackers use the recent Nobelium-USAID phishing campaign as a lure,” Alibe said.  More