Smart working & security: use the right tools

When moving to smart working in an unprepared company, you often have to deal with implementing technologies quickly and often with unsafe systems in a short time.

What solutions are suitable for my company and why are free services often a “trap” for our personal data?

Let’s start with the first scenario: a small office decides to make its employees work remotely from home using private personal computers: the IT technician will configure e-mail and access to cloud platforms and remote NAS if present by opening them on the employees’ PC the ports on their external corporate firewalls. You will think: it is just very easy! Here think this is a serious mistake. In this way, access to company data will be transmitted on an insecure platform (are we sure that the employee’s PC has no trojan, no malware or ransomware installed?) And I assure you that it will be enough to open a “fake” email with a fake “wetransfer” or an email with any “invoice” in xls or docx that our beautiful word of 2013 that we have installed on the home pc running Windows 7 (yes because not everyone has the luxury of using the office 365 subscription or last win 10 at home) that our nice system will transmit in half a second all the access keys including passwords, mail etc of the sites saved on the browser (you like not having to remember the passwords maybe write them on a notebook, right?) and then not only your system but the entire corporate security will be put at serious risk.


Let’s look at a second scenario: a company decides to implement a IPsecVPN on the firewall (virtual private network) to guarantee secure access to its employees to the internal network.
Practically a “tube” is created that allows remote access to the company infrastructure and therefore guarantees the security of data exchange.
Do you want to know what happens here? Here we have obtained in one fell swoop the saturation of the upload and download bandwidth of the company’s internet connection. Well yes unless you have very high speed network connections (above GB / s) and a limited number of users (maximum 10/15 employees) this solution immediately leads to bandwidth saturation and slow connectivity. On the contrary, assuming that the VPN is configured in a proper way and the IP addresses of the unique people are entered in the firewall whitelist or a secure RSA key authentication system is used (which is not put into operation in half a day) this solution is quite reliable.
PERSONALLY what I suggest is to have a virtual machine that runs on a parallel system (e.g. citrix or VirtualBox) or USB already configured to be able to work remotely. In that way only sniffing on network ports could lead me to have security problems.

Now let’s look at the third scenario: using remote assistance software.
There are now several very popular remote assistance software that allow you to remotely control your PC. What it means: practically it is a matter of leaving the PC on in the office and managing it comfortably from any platform we have at hand, PC, Mac, tablet, smartphone, allowing us to work remotely, access all our folders and data and send / receive mail in complete safety.
I recommend using this solution for small businesses. There are many software around for this service, personally I suggest SUPREMO a completely Made in Italy project with a complete architecture like Teamviever but with an extremely competitive cost and with secure servers located in Europe.
You can download the trial version at this link just install it on the machine to be controlled and you will have created an excellent smartworking system.

Cybersecurity for everyone: is it really so difficult to protect yourself?

In recent months, the keyword for companies and IT professionals is this: “cybersecurity”.

But what do we mean by cybersecurity? Let’s take a step back: it ran the year 1985 and Apple went out with its flagship model MAC SE, an all-in-one monster as we would say today with as many as 2 drive 800kb and a microprocessor MC68000 on board capable of working at the powerful frequency of 16Mhz with 8 bit bus and CRT screen in grayscale. Connectivity: Keyboard, Mouse and some auxiliary for centronics printers and external color monitors. No wi fi, no LAN and no bluetooth. everything was done locally and .. if you had to do a program there were no github or source sharing where the community came in handy: all the code, often in assembler or cobol had to be inserted locally.

Only an external modem, an adapter that transformed the bits of a serial port into tone sequences made them compatible with the transmission systems for the voice, could connect to the external node, to the powerful 1200bps or 1.2Kbps or 0.0012Mbps to exchange messages and information mainly textual, with a unique way of identifying: the famous “Login”

Substantial difference with today’s world: then the connection was point-point to today instead we are part of the network, or if before there was the provider to ensure access to the network, today the provider in most cases is limited to open the door and to assign you a public ip that is, make you part of the WAN.

Did I run too much? Let’s see it simpler: broadly we assimilate the internet world to a big city that we call WAN the inhabitants call them HOST, the streets we call NETWORK or NETWORK, the round ones we call SWITCH, the postmen we call ROUTER and the police that watches over the thefts we call it FIREWALL We will call the mailboxes END POINT or NODE

Here at this point we put our beautiful little package that Riccardo wants to send to Mark who lives on the other side of the street. here is this package we call it IP Packet

Like any self-respecting package, the IP packet must have the content inside it and out the indications on the sender that we will call SOURCE and the recipient we will call DEST. You will not miss the zip code we will call SUBNET. We also insert a warranty seal that we will call CHECKSUM which guarantees the security that nobody opens the package.


Now imagine the path of the package using the terms just assigned: Riccardo after completing the IP package with SOURCE, DEST and CHECKSUM puts it in a NODE. The NETWORK composed of ROUTER reads the sender and destination information and will forward the package to the final post office (ROUTER) by reading the contents of the SUBNET and comparing it with its own: if the number does not match the package will be sent back to the network without being touched . Only when the IP of DEST will be equal to that of the final node will be opened, controlled the CHECKSUM and removed from the NETWORK.

Okay, I do not want to explain all the internet in 4 lines but the goal is to simplify: Imagine that an attacker wants to steal your mail package: what are the most sensitive points? Surely departure and arrival because in the network everything goes alone you will think, right? error! Imagine that in the city an attacker puts a street and a street equal to yours, but false and the unaware courier delivers to him instead of you: here you have just suffered a SPOOFING or your package containing important data is finished by another without you realize it.

Imagine instead that you have a close curiosone and opens the packages in your mailbox before you can receive them to know what you buy: this is the SNIFFING. You say: hey but I put the warranty seal! But your neighbor has access to the TCP IP protocol and can put the seal back on without you realizing it …

There are many similarities between the postal world and the internet world, and just like the goods, the data are values ​​and we need to protect them. And every point in the city can be a potential vulnerable point to lose information (LEAK). I tell you the last two that I like very much when I explain it, the DoS or the Denial of service attack and the Buffer Overflow:

Risultati immagini per spione

Imagine that your mailbox is full and you do not have time to empty it that fills up again, and you do not have time to read all the letters received: If you are an office it is obvious that you will not be able to answer all the requests so you will have your employees who work at full strength with an almost final result and a “hiccup” operation. Here this is a DoS attack or send thousands of packets at the same time to the usual address.

Imagine instead of receiving a package that is slightly smaller than the hole in your letters: the postman inserts it but then nothing will come in until you remove it, and all incoming mail will be sent back to the sender: here you have a BUFFER OVERFLOW attack.

Who saves you from this security pandemonium? the FIREWALL, first of all, monitoring the transport of the packages, the PROVIDERS that protect the NODES with anti-intrusion systems, and the CIFRATURES that make the data only be decrypted to those who know the key. And on our HOST or us, how can we defend ourselves against the bad guys (MALICIOUS) who want to access our information?

A good security starts from the knowledge of the enemy: consult with your trusted computer to know the most common attacks, often few and right measures of CYBERSECURITY to avoid irreversible damage and continue to use the services of NETWORKING in security.



Get payed in Bitcoin & crypto: opportunity for business

From 2012 for insiders and geeks, since 2017 on everyone’s lips and in the virtual wallet of many.
Let’s talk about bitcoin and other cryptocurrency that have been revolutionizing for some months and for some they promise, thanks to their volatility, big profits.
But today we will talk about the advantages for a company to accept cryptocurrencies.
Let’s take a step back: in 2017, many traders, experts and onlookers have for the first time invested in bitcoin or tried the jealousy of receiving or sending an electronic payment based on the blockchain or the computer network that takes charge of authorizing and ensuring that payment takes place; maybe they only exchanged a few euros to try, but thanks to the popularity and growth of value in the months those few euros have now turned into a few hundred, or thousands for the lucky ones. Now: what to do with it?
In the World there are many companies that accept cryptocurrencies, but often the services are for the internet and rarely real exercises are interested in accepting currencies of which they do not know how to use them.
(find the list here
It’s a bit like when credit cards circuits began to enter the market and you could only trust their logo or their brand (VISA, MASTERCARD, AMERICAN EXPRESS etc ..) or the bank that had issued them. Bitcoin or all other chryptocurencies do not have a credit institution behind them and their volatility follows the pure trend of the market, and, in the long run, no guarantee is provided.
Where is the advantage for a business, a restaurant or a small shop in accepting bitcoin payments? It is precisely the spread in continuous expansion and the lack of commercial businesses where to spend it represents an opportunity to be seized.
Do you think that bitcoin at the dawn was born to make small payments and … the first transaction in the history of bitcoin was just to buy a pizza! 10,000 bitcoins for a couple of daisies in 2010! ( to date it would have been worth around € 100 million!
The market and the Swiss square has always been linked to the world of finance and currencies and, unlike many countries where cryptocurrencies are viewed with suspicion, it promotes their use and has become the European “cryptovalley”.
What do you need then to accept bitcoins and other cryptomoney? All you need is an app or a simple qrcode stuck on your cash desk, and you’re done, you can start immediately receiving your customers’ payments in a simple, fast and innovative way … and you can attract a “digitalized” customers before your competitors! I just have to tell you … good bitcoin to everyone!

Galardi Media Network, in cooperation with is at your disposal to give you all the information on how to start accepting payments for your business.

Google Virtual 360 Tour – Does it Help Your Search Ranking?

Google Street view for business does really benefits to our Businesses?


As more than 90% of online research is done through Google, it seems wise to make the most of everything Google has to offer. And there are numerous benefits promised with having a Virtual Tour listed with Google:-

1. Better Search Results

With a Google Virtual Tour the size of your search results expands and helps you stand out on the page. Normally a search result is a couple of lines of text, which can easily be overlooked. It’s nearly impossible for Google users to miss you with a Virtual Tour.

2. Build Confidence in your Brand and Business

A Virtual Tour offers that extra confidence in your business by allowing clients and customers a view inside and see how and where you work. It can also set you apart from competitors. As clients naturally feel more affinity with a business they can see.

3. Increase Local Traffic and Local Engagement

The stats are that 97% of people search for local businesses before making a decision.

Whatever your business, whether it’s offices, retail, or service industry, the evidence suggests that more people will be enticed to purchase from you, if they know where you are. Studies have shown that 59% of customers visit a business within the same day of their search, and 18% of local searches lead to a purchase within the same day.

4. Can we afford not to?

A Google listed Virtual Tour might be one of the most inexpensive ways to market your business online. After the initial outlay of working with a professional agency who can capture multiple 360 degree panoramic photo shots of your business premises, Google hosts everything for you at no cost. There’s no ongoing subscription fees. It seems a small price to pay for something with an indefinite return.




If you are interested to book your Virtual Tour with us you can click here and discover more:

Google Tour 360°

Silversea & Galardi Media Network launches the first world Photo Academy on a luxury Cruise ship

A project unique in the world, for all photography enthusiasts and not only, comes to life on Silver Cloud thanks to the commitment of Silversea & Galardi Media Network

Luxury expedition cruise specialist Silversea has introduced its new My Photo Academy on sailings to Antarctica aboard Silver Cloud, utilizing the ship’s new Photo Studio as a hub for the multifaceted enrichment program.

With a mesmerizing landscape and amazing wildlife as the backdrop, guests will have the chance to elevate their photographic prowess by learning how to take and edit pictures like a professional on itineraries designed to maximize expedition time and the opportunities for shooting great images.

“Our new photography program is a perfect fit for the immersive expeditions we offer in Antarctica,” said Conrad Combrink, SVP Strategic Development Expeditions and Experiences. “Voyaging to the bottom of the Earth is a once-in-a-lifetime experience, full of magical moments that we hope to help our guests capture in beautiful images they would be proud to display in their home or office.” With both private and group lessons, guests can learn to master the art of digital photography through the Academy, which provides an array of specialty workshops for both beginners and pros. Among the topics covered is an introduction to photography, social media, and the use of Adobe® Lightroom® and Photoshop® software tools to edit images to get just the right look.


Unique to Silver Cloud, the Photo Studio — designed and implemented in collaboration with Galardi Media Network, a Swiss company specializing in new technologies and multimedia — is a vibrant space of creativity featuring state-of-the-art equipment for both MAC and PC users, including high-quality printers available for use on a fee basis for guests wishing to create postcards or take home frame-ready pictures, including panorama- and A2-size prints. A user-friendly, touch-screen interface makes it easy for guests to print their own photos.
With the guidance of a professional photo manager, guests can learn and practice their photo-editing skills on such high-grade professional equipment as:


Six HP Envy 27-inch, all-in-one desktop computers
Six iMac 27-inch, all-in-one desktop computers
Four Loupedeck photo-editing consoles for Adobe Lightroom
Two DNP dye sublimation photo printers
Two Epson inkjet plotters
Custom workshop management software
Three Samsung 55-inch screens with 4K picture quality
One Samsung 65-inch screen with 4K picture quality

Additionally, guests can schedule a 20-minute, one-on-one appointment with a photo-editing expert to receive guidance on a host of topics, including:

Smart gear recommendations
Instruction on proper camera use
Camera menu optionsHelp with social media and posting: Facebook and Instagram


 The intimate Silver Cloud accommodates just 200 guests in polar waters. A fleet of 16 Zodiacs provides unprecedented opportunity for up-close exploration, while 10 kayaks offer a truly personalized experience of nature in the polar realms. Twenty or more passionate and dedicated Expedition Team members are always at hand to share their considerable knowledge and insights. They give lectures in the multi-tiered Explorer Lounge, run workshops, lead Zodiac and kayak trips, and guide nature walks — all of which is complimentary. Expedition voyages to Antarctica are offered from November through February.–silversea-launches-new-photography-academy-in-antarctica.html


Contact Us:

We'd love to hear from you. Email or call us if you need more information about us or our products. Our team will answer as soon as possible