SiSustainable

SiSustainable was created in Finland in 2009 by Eerik Wissenz, to offer consultancy and services in open source web creation and server management.

Eerik Wissenz is currently CEO of Solar Fire Concentration Oy- and passionate for open source software.

Currently SiSustainable focuses on providing consultancy and server support services to businesses and other web-developers.

SiSustainable can provide consultancy, training and coding services in open source webcreation, server setup and management, security and encryption.

Information Security

It only takes a couple of hours to get the training to use free and open source encryption systems that, once the concepts and basic tools are understood, offer far more security than plain-text email and completely unsecured hard-drives.

The key to information security is putting the appropriate security tools in place before your organization needs them, not afterwards. Since most cyber crime is designed to go undetected (mostly stealing information), prevention is the only reasonable choice.

Security misconception 1 : I have nothing to worry about

Though Mr. Snowden told the world what most bare-metal server admin professionals knew (that unsecured plain-text personal information can be collected at every point on the internet and spy agencies probably do a lot of that), people and businesses unconcerned by government surveillance should not conclude they do not need information security. The biggest threat to most people and organizations is cybercrime that collect personal information and trade-secrets for resale.

Security misconception 2 : if the big guys get hacked, what chance do I have ?

High profile hacking cases of large organizations and tech companies happens regularly ; most likely many more cases go undetected or resolved privately. So, can seem that the small guy has no chance. This is a very wrong thinking. First, even if there was no way to prevent 100% penetration of one’s data, it still makes sense to do simply things to make it harder. Second, though large organizations have more ressources, information security goes up as much, if not more, relative the size of the organization as failure points multiply, systems become more complex and harder to secure (not to mention the trust issue). Which brings us to our third point !

Security misconception 3 : encryption isn’t easy

Security problems essentially scale with organization size as discussed above, which goes also the other way. For an individual or small organization a good security setup can be setup in an afternoon with completely free tools that are industry standard. Of course, they are not 100% secure but "unknown" vulnerabilities are unlikely to be used against a single individual or organization.

Once setup encryption works in the background, the only downside is that you need to keep multiple independent copies of your data as encrypted information is harder to recover in case of a hardware failure.

Conclusion : get the consultancy you need

There’s of course plenty of ressources online — the only problem is there’s too much. With a consultancy from me you’ll get an overview of the different tools available (SHH for file transfer, RSA for email, disk encryption, and virtualization of unsecure programs), how to use them, what to expect using them, and how to integrate these tools with your existing workflow with minimal changes and how craft a security policy that makes sense for your organization.

I believe in real security — not integrating another fail-point in your workflow or a "feels secure" click to install this program. I teach you how to get, understand, install and use the industry standard network security tools on my own test system. I don’t need access to your data or systems. I leave you with verifiable knowlege and procedures to secure (and how to recover when you’ve made things "so secure" even you can’t access your system*) ; you can then implement and control your secure system.

Information security is relatitely easy to use and should be common knowledge (as common as keys on doors) but the internet has grown so fast.

*Recovery does not mean hacking into your own system, that should not longer be in any way easy, but rather just dealing with problems that can happen, encypted or not (if your system won’t boot normally, which can happen for number of reasons, you can still get your data off the hard-drive with a live disk — you’ll still need your password, and key-backup, to then access it).