SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Financial Adviser
Cyber Information Security
What you need to know
IP Sentinel – watching over your intellectual property

ACT NOW
You are responsible for some of the most valuable data in the world. That of your clients’.
It is imperative that you know how to process, protect and manage that information.
The penalties for not doing so can run into the millions and ruin the reputation of your business.
The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have
requirements you have to meet.
Do you know what your responsibilities are?
Do you understand the threats to the information you hold?
Do you know how to protect yourself?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

What is Information?
As an adviser you have ‘Identifying Data’ for each and every one of your clients

•

Name, address, email, contact telephone

You also have so much more due to AML & KYC requirements

•

Copies of passport, driving licence, utility bill, bank statements

You could have even more that that

•

Bank account details, investment histories, insurance policy details

This information is valuable to your clients
Your servers probably hold enough information for criminals to steal the identity of every one of your
clients
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

You are responsible for client information
The Financial Conduct Authority

•
•
•

FCA Principle 2
FCA Principle 3
Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook
(SYSC)

The Information Commissioner

•

Data Protection Act 1998 and 2003

The PI Insurer

•

Whilst you may have cover in place for a limited third party loss relating to cyber security, it is
unlikely that your existing cover will reinstate any losses to your own business
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you process information?
To manage your client accounts and information

•
•
•
•

Do you have a manual process that is largely paper based?
Or is your process largely email, spreadsheets and word documents?
Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system
Or a Vendor provided Practice management solution?

Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a
network arrangement.
Would you know if information had gone missing?
What would you do if you discovered that it had?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Where do you keep information?
Your clients have given you their information. Do you know where that information is
now?
• On your laptop/PC
• Or in hard copy in a locked filing cabinet in
your office
• Or stored in a document archive offsite
• Or stored as an attachment in your email

•
•
•
•
•

Or saved as a spreadsheet on a file server
Or in a vendor supplied application
Or in the “cloud”
Or hosted on a vendor service
Or on a 3rd party backup service

Probably a little of all of the above
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you protect information?
•

Who should and who actually does have access to
client information?

•

Do you trust them? Does their employment contract
cover their responsibilities?

•
•
•

Who is responsible for Data Protection?
Who is responsible for dealing with a Data loss? Hack
attack? Computer crash?
Who is responsible for Employees joining and leaving,

as well as examining what they bring or take with
them?

•
•
•

Do you encrypt the data? If so how?

•

Do you audit your policies & their implementation
regularly?

How do you communicate? WiFi? iDevice? Laptop?
Do you have an IT policy on passwords? User access
levels?

IP Sentinel can provide you with a solution
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Your Strategy
Carry on as you are - Sorry that’s not going to work for too long
• The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make
sure you do something. It’s all over the news.

Buy Cyber Liability Insurance – Deals with the finance aspects only

•
•

It’s not cheap!
Doesn’t help your reputation or replace your clients.

Let my IT department manage this problem

•
•

Data Protection is a whole business issue
It is a specialist area

If you think you need to do more, IP Sentinel can help
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Engage IP Sentinel
IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace.
We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators.

Step 1: Recognition
Step 2: Prevention
Step 3: Monitoring & Mitigation
Step 4: Response & Recovery
Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your
responsibilities,
call us today on 01825 701870
Or email info@ip-sentinel.com
Or visit our website http://ip-sentinel.com

info@ip-sentinel.com
http://ip-sentinel.com

Contenu connexe

En vedette

Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 AnnyZhu315
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913Mohsen Memarzadeh
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentationBluerise
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioHolly Dowden
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successjareddroy
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...Sarah Cohen
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemBen Grossman
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Chuck Bowen
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's GuideMarshallRosario
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupFlexera
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc.
 

En vedette (14)

Run For Freedom 2012
Run For Freedom 2012Run For Freedom 2012
Run For Freedom 2012
 
Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014
 
Hurricane preparedness white paper
Hurricane preparedness white paperHurricane preparedness white paper
Hurricane preparedness white paper
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentation
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer Portfolio
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to success
 
Konduko institutional
Konduko institutionalKonduko institutional
Konduko institutional
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's Guide
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Adviser & DFM Cyber & Information security

  • 1. Financial Adviser Cyber Information Security What you need to know
  • 2. IP Sentinel – watching over your intellectual property ACT NOW You are responsible for some of the most valuable data in the world. That of your clients’. It is imperative that you know how to process, protect and manage that information. The penalties for not doing so can run into the millions and ruin the reputation of your business. The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have requirements you have to meet. Do you know what your responsibilities are? Do you understand the threats to the information you hold? Do you know how to protect yourself? info@ip-sentinel.com http://ip-sentinel.com
  • 3. IP Sentinel – watching over your intellectual property What is Information? As an adviser you have ‘Identifying Data’ for each and every one of your clients • Name, address, email, contact telephone You also have so much more due to AML & KYC requirements • Copies of passport, driving licence, utility bill, bank statements You could have even more that that • Bank account details, investment histories, insurance policy details This information is valuable to your clients Your servers probably hold enough information for criminals to steal the identity of every one of your clients info@ip-sentinel.com http://ip-sentinel.com
  • 4. IP Sentinel – watching over your intellectual property You are responsible for client information The Financial Conduct Authority • • • FCA Principle 2 FCA Principle 3 Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook (SYSC) The Information Commissioner • Data Protection Act 1998 and 2003 The PI Insurer • Whilst you may have cover in place for a limited third party loss relating to cyber security, it is unlikely that your existing cover will reinstate any losses to your own business info@ip-sentinel.com http://ip-sentinel.com
  • 5. IP Sentinel – watching over your intellectual property How do you process information? To manage your client accounts and information • • • • Do you have a manual process that is largely paper based? Or is your process largely email, spreadsheets and word documents? Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system Or a Vendor provided Practice management solution? Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a network arrangement. Would you know if information had gone missing? What would you do if you discovered that it had? info@ip-sentinel.com http://ip-sentinel.com
  • 6. IP Sentinel – watching over your intellectual property Where do you keep information? Your clients have given you their information. Do you know where that information is now? • On your laptop/PC • Or in hard copy in a locked filing cabinet in your office • Or stored in a document archive offsite • Or stored as an attachment in your email • • • • • Or saved as a spreadsheet on a file server Or in a vendor supplied application Or in the “cloud” Or hosted on a vendor service Or on a 3rd party backup service Probably a little of all of the above info@ip-sentinel.com http://ip-sentinel.com
  • 7. IP Sentinel – watching over your intellectual property How do you protect information? • Who should and who actually does have access to client information? • Do you trust them? Does their employment contract cover their responsibilities? • • • Who is responsible for Data Protection? Who is responsible for dealing with a Data loss? Hack attack? Computer crash? Who is responsible for Employees joining and leaving, as well as examining what they bring or take with them? • • • Do you encrypt the data? If so how? • Do you audit your policies & their implementation regularly? How do you communicate? WiFi? iDevice? Laptop? Do you have an IT policy on passwords? User access levels? IP Sentinel can provide you with a solution info@ip-sentinel.com http://ip-sentinel.com
  • 8. IP Sentinel – watching over your intellectual property Your Strategy Carry on as you are - Sorry that’s not going to work for too long • The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make sure you do something. It’s all over the news. Buy Cyber Liability Insurance – Deals with the finance aspects only • • It’s not cheap! Doesn’t help your reputation or replace your clients. Let my IT department manage this problem • • Data Protection is a whole business issue It is a specialist area If you think you need to do more, IP Sentinel can help info@ip-sentinel.com http://ip-sentinel.com
  • 9. IP Sentinel – watching over your intellectual property Engage IP Sentinel IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace. We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators. Step 1: Recognition Step 2: Prevention Step 3: Monitoring & Mitigation Step 4: Response & Recovery Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your responsibilities, call us today on 01825 701870 Or email info@ip-sentinel.com Or visit our website http://ip-sentinel.com info@ip-sentinel.com http://ip-sentinel.com