GoodNet.io
The internet is increasingly instrumental to our economic growth and is reshaping the fabric of our society. Unfortunately we are discovering real challenges for all families and businesses, whether they are aware of it or not.

Families

In just a few years technology has had a profound impact on families. It has changed how we interact with each other, how we spend our time, and who we look to for happiness and a sense of connection. Technology has truly stressed our relationships — from our relationships with our spouse to our relationship with our children and parents.

Would it be outrageous to suggest that your family can benefit from:

  • Spending less time on the phone? Social media? Video games? Netflix, YouTube, etc.?
  • Being less distracted by the sound of new messages and notifications?
  • Spending less time and money on online video games?
  • Having limits on access to adult content?
  • Getting a better night's sleep?
  • Spending more quality time together as a family?

If you are feeling challenged, you are not alone and you are not to blame. The technology giants of today employ psychologists and big-data algorithms specifically to create highly addictive services. We can help you fight back.

Creating a structured and supportive environment is no simple task however. It is certainly not as simple as blocking a few websites or turning off the internet at bedtime. Teenagers and young adults, in particular, are tech savvy (at least compared to the typical parent). With a simple Google search they quickly find ways around most restrictions. We are an IT company with a focus on behaviour. We can give you the support you need. We will take care of the details with features specifically designed for busy, modern homes so you focus on your relationship with your family, their mental and physical health, and their growth and learning.

Reach out to us and learn how we have been helping other families overcome these challenges.

Email: families@GoodNet.io

Phone: 778.819.8501

Small Offices &
Home Offices

If you are an executive, a public figure, a high-net-worth individual, or if you run a home-based business, you may not consider yourself a target of cyberattacks, and you may be right, but probably not. As you are reading this, automated computer systems are scanning your phone and home network looking for security vulnerabilities every 2 to 5 seconds. In fact these bots do this for all networks, ours included. We are all targets. The actual target is banking information, investment portfolios, confidential information, identities, crypto wallets, and even electricity.

Most of us think of home as a safe place. We can manage our physical security by living in a good neighbourhood and locking our doors. Cybersecurity is very different. Our home network and cellular devices are all connected all the time to the whole world, which means that anyone, anywhere can reach out and attempt to connect to them. Our homes can become very dangerous environments thanks to the internet.

The situation can be even worse when you consider that:

  • In almost all typical home networks the devices connected to the network are also connected to each other. If any device inside the network is compromised, every other device on the network is in immediate danger.
  • Consumer routers, which are supposed to act as the secure gateway between the internet and home networks, are low-cost, commodity devices that are very infrequently, if ever, patched. They are routinely hacked giving remote attackers access to all devices in the home.
  • Teenagers are curious and adventurous by nature and so they often take actions that may not be most in-line with the family's safety and security. Accessing adult content, sharing videos and music, and downloading cheat programs for video games are typical activities for teenagers that are routinely and maliciously exploited. Teenagers' devices often end up badly compromised putting all of the other devices and information in the home at risk.
  • More and more homes are internet-connected smart homes. We have sound systems, TVs, light bulbs, temperature control systems, automatic blinds, refrigerators and even toilets (debuted at the CES tradeshow this year) connected to the internet. Unfortunately many of these devices are designed for speed-to-market and low price, not cybersecurity. They are some of the easiest targets for hacking and perfect backdoors for attacks on a home's entire network.

If you are concerned about the environment in which your sensitive work, data, and personal devices live each and every day, consider reaching out to us. We can help you understand your IT environment and if needed, put safeguards in place from the internet and even from the other devices in the home. We take care of the technical details so you can focus on your business.

Email: smalloffice@GoodNet.io

Phone: 778.819.8501

Businesses

The internet has unfortunately become like the old Wild West, except instead of gun fights and day time bank robberies, criminal activity takes place silently and out of sight. No news is not necessarily good news, and free or near-free tools like antivirus software are not adequate protection.

Some critical realities:

  • On average it takes more than 6 months for an organization to detect an intrusion and then another 55 days to contain the breach. Is it at all possible that your business is being actively exploited without you knowing?
  • According to the Canadian Internet Registration Authority, 40% of businesses experienced a cyber-attack in 2018. Has your business managed to escape being a part of these statistics?
  • Automated computer systems indiscriminately scan all networks, searching for security vulnerabilities. A typical network is scanned every 2 to 5 seconds. Could your business be a part of the unlucky majority of un-targeted cybercrime victims?
  • Compared to a physical break-in, the extent of damages from a cyber incident can be nearly unlimited. Is there any chance that a cyber attack can put your business's existence at risk?
  • There have been numerous documented cases where trusted vendors and suppliers proved to be the backdoor for cybersecurity incidents. Could your vendors and suppliers be posing a risk to your business? Would your customers trust you more and maybe even do more business with you if they knew your infrastructure is cyber secure?
  • Printers and other inexpensive devices that we take for granted, are often exploited to attack networks. Has the driving factor behind your automation been business risk or upfront cost?
  • In 2018, several new federal and international regulations were passed, imposing massive fines for failing to protect customer data and report data theft. Is your business at risk of a fine for not complying with all of these regulations?
  • There are currently several cases before the courts where insurance companies are refusing to pay cybersecurity policy claims. What would it mean for your business if your cyber insurance policy refused to pay? What could your damages be?

Is it preposterous to consider the possibility of your network leaking customers' or suppliers' confidential information, or even your own business's intellectual property, banking information, investment portfolio, business plan, etc.? If not, consider reaching out to us.

We can help you secure your business. We take care of the technical details so you can focus on your core business.

Email: businesses@GoodNet.io

Phone: 778.819.8501

Industrial Facilities &
Large Enterprises

Many of the cybersecurity risks and challenges faced by industrial facilities and large enterprises are shared by most businesses. If you are new to cybersecurity or our website, we encourage you to read our "Businesses" section above first, and then continue here. Of course, industrial facilities and large enterprises deal with additional important complexities that are worth exploring:

Targeted Attacks

While most cyberattacks exploit device and network vulnerabilities and do so indiscriminately, large companies are readily targeted. For these businesses, a disruption to their operation can be catastrophic, something that attackers hope is worth the price of a large ransom. Of course attackers also look to exploit any confidential data that they can gather, to offer to competitors, game the stock market, launch attacks on connected businesses, vendors, customers,... and much more.

Industrial Internet-of-Things (IIoT)

For many businesses, their operation, efficiency, security, or even viability is now intertwined with their use of connected devices, such as quality inspection equipment, robotic systems, access control systems, CCTV systems, and even simple smart temperature and humidity sensors. Unfortunately, instead of cybersecurity, many of these systems are designed for speed-to-market and price. Consequently, they are some of the easiest targets for hacking, and perfect beachheads for attacks on a facility's entire network. For example, in 2017 a high-profile casino was hacked through a weakness in a temperature sensor in a fish tank in the lobby.

Reliance on Vendors and Suppliers

From an attacker's perspective, the game of cybersecurity is akin to finding weak links in a physical chain. Depending on the target, it could be easier for an attacker to find weaknesses in the target's trusted vendors and suppliers. In 2014, the big retail chain, Target, was hacked through their heating, ventilation, and air conditioning (HVAC) systems supplier. In 2018, the US utility networks are reported to have been breached by Russian hackers through trusted vendors. Do you know if your suppliers are cyber secure? Do you have systems in place for limiting and monitoring their access to various areas of your network?

Given what is at stake it is not irrational to err on the side of caution. We can help you understand your security exposure, and give you the capabilities you need to protect your infrastructure from outside attackers, trusted vendors and suppliers, and even bad actors from within your organization. We take care of the technical details so you can focus on your production.

Email: largebusinesses@GoodNet.io

Phone: 778.819.8501

Governments

Times have evolved and so have the battle fronts. Today's battles are over information and access to control. The new attacks are also discreet, under-the-radar, multi-pronged, computer driven, and very effective. If you are new to cybersecurity or our website, we encourage you to read our "Businesses" and "Industrial Facilities & Large Enterprises" sections above first, and then continue here.

In addition to the challenges of any large enterprise, governments are targets of other countries that are investing heavily in maximizing their espionage and attack capabilities. But, who can countries looking to invest in defense turn to? In this new age, which country do you trust? Whose technology do you trust to incorporate in your infrastructure?

We encourage you to get to know us, whether you are:

  • A political party looking to protect your campaign from eavesdroppers, both domestic and foreign,
  • A municipality, city, or country, looking to protect your elections from tampering, or
  • A government committed to fully protecting its officials and agencies and all the confidential information in their possession.

We are an all-Canadian cybersecurity company with a fully made-in-Canada product. See for yourselves if we are worthy of your trust.

Email: governments@GoodNet.io

Phone: 778.819.8501

Technology &
Service Providers

The full spectrum of the GoodNet.io technology offerings spans beyond even the areas mentioned above.

What if we could give your company the ability to:

  • Become a market leader with new and genuinely revolutionary technologies?
  • Expand into new markets and do so quickly?
  • Gain an immediate and profound competitive advantage?
  • Offer new bespoke products and services very quickly?
  • Offer new products and services into a domain where there is much less competition?
  • Increase your top line and do so with high-margin offerings?
  • Hedge against current product and service offerings losing traction, and growth curves plateauing?
  • Protect against new competitive threats from companies outside your traditional sector?

Our technology stack can revolutionize the business and business models of:

  • Internet Service Providers (ISPs),
  • Security technology companies,
  • Security monitoring companies,
  • Building/infrastructure technology companies,
  • Automation companies,
  • And many others.

If you would like to learn more about our innovative technology stack and potentially explore a mutually beneficial partnership, connect with us.

Email: technology@GoodNet.io

Phone: 778.819.8501