Why is it risky to look up the time on the Internet?
Using an Internet service to retrieve and distribute the time is a common practice in many businesses. It doesn’t require any special equipment – just an Internet connection. Up to now, this practice has seemed simple and safe in principle. However…
Accessing Internet-based time servers requires a specific port that creates an opening in your firewall. This open door allows you to recover the time easily, but it also opens up a security gap. It’s this hole in your computer network that significantly increases the risk of intrusion and exposes you to viruses, attacks, spying, debilitating failures, and other cyber-threats.
In IT security, it’s better to be safe than sorry.
Another point about the Internet: it’s (almost) free. You actually retrieve the time with a simple Internet connection, but this doesn’t take into account the potential costs of a security breach. Once you add up the costs of shutting down your business and solving the problem, the amount is often significant. Most importantly, the budget is much larger than what is needed to guard against these breaches.
The consequences can go well beyond financial risks: in some cases, the company’s survival is at stake during major attacks. From a communication perspective, your company’s image may also suffer.
What equipment is needed to enhance the security of an IT network?
To enhance the security of your IT network and therefore limit the risk of cyber-attacks, the most suitable equipment is an internal time server. It’s a reliable, secure time source, easily installed within your company. It gives you a safe way to distribute an accurate, identical time to all information system equipment (clocks, computers, printers, etc.).
In addition to minimising your attack exposure and continuously distributing an exact time, the time server also allows you to synchronise your equipment, time-stamp, and trace events on your network. For more information, visit our dedicated Bodet time servers page and learn about the applications based on your industry as well as the possible options.