The UK government has launched a £30m UK-wide competition help rural areas seize the opportunities presented by 5G technology, which offers mobile connection speeds 10 to 20 times faster than 4G.

Currently only around 67% of the country can access a good 4G signal and therefore the government are planning reforms as a means to removing current barriers whilst realising that there must also be a balance between the interests of the landowners and mobile operators.

The Rural Connected Communities competition will see up to 10 rural locations selected to run trials of 5G applications with the aim of stimulating commercial investment in 5G technology.

 

5G technology is already being used in the Orkney Islands to remotely monitor salmon fisheries.

In line with this the government has also launched a consultation on proposals to simplify planning rules to improve rural mobile coverage across the country.

Reforming planning laws for mobile infrastructure was a pledge made by prime minister Boris Johnson during his campaign to replace Theresa May.

He said he wanted to “level-up connectivity” for communities across the UK, further support the roll-out of 5G and boost the economy.

The consultation on potential changes to permitted development rights for mobile infrastructure in England includes proposals on changing the permitted height of new masts to deliver better mobile coverage, promoting mast sharing between mobile providers and other utilities and minimising the need to build additional infrastructure.

Currently masts on public land must be no more than 25m high but the government wants to relax these rules and so the UK could see some as tall as 50m in the future.

Other proposals include allowing building-based masts nearer to main roads to support 5G and increase mobile coverage.

A Managed Service Provider (MSP) must deliver to its clients:

  • Reduced communication costs for clients
  • Increase client revenue
  • Offer new technologies to clients

This is done by knowing more about the clients business than just the technologies available to that client .

 

On October 1st, Ofcom is introducing a new sub-range of London numbers beginning 0204

Don’t just communicate Collaborate
Video Calling – Create a stronger collaborative experience using visual communication from mobile or desktop app.
Instant Conferencing – Quick and easy multi-party collaboration using a fully managed conferencing space.
Reduce Cost and Complexity – Through features such as Presence, Video Call and Collaboration, employees can work flexibly through hot-desking, home working or on the move.
Instant Messaging – Collaborate quicker, smarter and instantly with Horizon Collaborate’s online chat.
Presence – Collaborate shows an always-on status that helps define the best way to communicate with colleagues.
New Horizon Call Recording service

 

The new Horizon Call Recording service will be available by the end of September. This secure and compliant recording service is custom built for Horizon and embedded within the core network, offering a reliable way to record all incoming, outgoing and internal Horizon calls.

 

Horizon customers will benefit from these new advancements:
New Call Recording web portal – simple and secure
Multiple access policies – different actions permitted to different user types (Admin, Supervisor, Staff user)
MiFID II compliant
Simple to use
Full encryption and secure storage, with automatic deletion at end of retention period
Advanced search, playback in browser
Bulk and individual download of recordings
Full audit logs and reporting

We are pleased to announce the launch of our bulk migration process for Vodafone and O2 voice and data and data-only SIMs.

 

Our process enables us to easily migrate large bases of Vodafone and O2 SIMs, subject to network approval. End-users remaining on a chosen network and moving to our services can retain their existing SIM cards. Those moving to a new mobile network will need new SIMs.

 

Bulk migration includes capturing information such as : PAC code(s), serial numbers / ICCID numbers, requested port dates (etc).

 

Our packages are available on 30-day terms, giving end-users more flexibility. SIMs are managed and monitored in Mobile Manager to review data usage.

 

For more information email ask@telephoneskent.com

 

IoT security has a poor cyber security reputation. Frequently manufacturers and IoT service providers often do not implement appropriate safeguards. Businesses and consumers typically do not change the default passwords nor update the pre-installed software. IoT security is too easy to ignore because by default its not given enough priority.

The following guidelines should be part of best practice :-

Default passwords

Many IoT devices are being sold with universal default usernames and passwords. The customer is expected to change the password before use. Until all IoT device passwords shall be unique and not resettable to any universal factory default value users should change passwords as a matter of cyber security policy

Software updates

Software resident in internet-connected devices should be securely updateable. Updates should be actioned in a timely manner.

Store credentials and sensitive data securely

Any credentials should be securely stored within IoT services and devices. Hard-coded credentials are not acceptable in device software.

Secure communications

Use of open, peer-reviewed internet security standards is highly recommended.

Limit exposed attack surfaces

Security-sensitive data should be encrypted when communicating, including any remote management and control. All keys should be securely managed.

Software integrity

IoT device software should be verified using secure boot mechanisms. When an unauthorized change is detected, the device should alert operators to the issue. The issue notification should not connect to wider networks than necessary to deliver the alert.

Data ownership and deletion

Who owns the collected data? IoT devices may change ownership and may be recycled or disposed of. Mechanisms should be provided that allow the users if they covered by GDPR and businesses to remain in control and remove data from services, devices and applications.

EE has launched their 5G services first in the UK but we quickly learned that unless you live in a particular part of the right city there is zero use for the services.

Belfast, Birmingham, Cardiff, Edinburgh, London and Manchester are the lucky cities to be turned onto 5G from the get-go, however the lowest-priced deal is an eye watering £54 a month (plus the cost of a 5G handset).

Looking at the EE 5G coverage map over London it looks patchy at best.

Vodafone are also on the cusp of launching their services (due in a few weeks). A bit of competition can do wonders to a market, and the prices offered.

Also, the speeds delivered aren’t quite what we thought 5G would be delivering. EE has suggested that 150-200Mbps is a realistic speed to expect with 1Gbps reached at quiet times.

5G will really set to turn the dial for IoT and the connected home. The rise of the smart home, and the smart office, will provide an endless supply of opportunity in connecting ‘things’ and then providing analytics back to users to enable them to live and work more efficiently

 

ISDN phone lines are being completely phased out within the next few years. There has never been a better time to consider switching your communications system to more sophisticated and agile technology.

 

SIP Trunking Solutions explained

 

Session Initiation Protocol (SIP) Trunking is a way of delivering voice services over the Internet. SIP can be supported on the IP (Internet Protocol) based phone systems or we can use a Gateway to connect to legacy ISDN2e or ISDN30 telephone lines

 

SIP trunks are the modern alternative to ISDN.

 

How we can help

 

There are still around two million ISDN trunks in everyday use across the UK. If you’re still using them in your business it’s probably because;

  • Your existing PBX can’t support SIP Trunks
    • It’s too costly to add to your existing PBX
    • Your existing PBX does everything you need and you want to maximise your investment for as long as possible

 

ISIP is a range of ISDN to SIP converters which allows you to keep your current PBX, whilst providing instant access to all the benefits of SIP.

ISIP is simple to deploy – just un-plug the ISDN cables from the BT service, plug them into ISIP, connect your new SIP service and away you go. ISIP is cost-effective and available in seven different Basic Rate/ISDN 2 & Primary Rate/ ISDN 30 variants – just choose the one that matches your current ISDN trunk capacity.

 

 

Hardware security has a poor cyber security reputation. Frequently customers and service providers often do not implement appropriate safeguards. Businesses and consumers typically do not change the default passwords nor update the pre-installed software. Hardware security is too easy to ignore.

Best Practice Guidelines

The following guidelines should be verified by the customer when hardware devices are purchased and/or services are subscribed to by the customer.

Default passwords

Most hardware devices ( routers, switches , firewalls , modems , telephone system units , IP end points of all kinds etc ) are being sold with universal default usernames and passwords. The customer should ensure the installer changes the password before use.

Software updates

Software resident in internet-connected devices should be securely updateable. Updates should not impact on the functioning of the device and be delivered in a timely manner.

Store credentials and sensitive data securely

Any credentials should be securely stored within hardware services and devices. Hard-coded credentials are not recommended in hardware device software.

Limit exposure to cyber attack

Security-sensitive data should be encrypted when communicating, including any remote management and control. All keys should be securely managed.

Software integrity

Hardware device software changes should be verified. When a change is detected, the device should alert operators to the issue.

Deliver resilient operation

Hardware services should continue operating functional when there is a loss of network connectivity. They should recover cleanly when power is restored. Hardware devices should return to a network operation in an acceptable , usable state and in an orderly fashion.

Telemetry data

Usage and measurement data should be monitored for security anomalies.

Data ownership and deletion

Who owns the collected data? Hardware devices may change ownership and may be recycled or disposed of. Mechanisms should be in place so that businesses remain in control and remove data from services, devices, and applications.

Easy device installation and maintenance

Hardware device installation and maintenance should require few steps and follow security best practices.