We hear daily about cybersecurity threats and attacks on international and local infrastructure. Just as important is security in our home networks and devices, where end users are often vulnerable to unwanted cyber breaches. As we mark Safer Internet Day on February 11, here are our reflections on the latest cybersecurity challenges and our approach to developing and providing security-resilient solutions.
Summing up the cybersecurity landscape
Recent cybersecurity reports address common issues faced by enterprises. A trend report from Telia, Sweden’s leading telecommunications operator, highlights what organizations need to prepare for regarding digital security. Challenges include balancing investments in security and technology while also preparing for the worst rather than solely focusing on prevention. Attracting security talent and developing expertise to bridge the skill gap is challenging. Isolated digital security initiatives and a lack of a comprehensive overview tend to be short-sighted and can become costly.
Another report from GlobalConnect, a leading provider of digital infrastructure and data communication, examines cybersecurity from the perspective of Scandinavian IT leaders and the risks they face. The report identifies similar factors that can weaken security, such as outdated digital infrastructure, including hardware, software, expired licenses, and data storage. Low levels of employee knowledge are weak links, and the lack of resources and authority for IT leaders also impacts security negatively.
AI: balancing friend and foe
AI is an additional cybersecurity challenge that we hear about in the news. AI can be used as both offense and defense. The integration of AI in cybersecurity is not new and can be traced to the 1980s. However, according to a report from professional services organization EY, AI-related cyber research, patents, and investments have increased sharply since 2015. As a friend, AI helps defend against cyber threats by analyzing vast amounts of data to identify patterns, and machine learning detects anomalies. AI can automate incident response to stop attacks from spreading or scan for phishing and fraud detection.
As a foe, hackers leverage AI for more sophisticated attacks, such as creating more realistic phishing emails or deepfake attacks using AI-generated voices and videos. The challenge is staying one step ahead of attackers.
Three ways Genexis protects home networks
As enterprises seek to protect themselves, end-users are just as concerned and place high demands on digital security. But it should be as easy as possible. Telia’s report comments that hacking a human is easier than a computer. Humans are hackable. This is particularly relevant for remote work, where professional and private life merges on the same in-home network with many devices and users.
At Genexis, we take these security challenges seriously. Security is our top priority. We work together with our customers to build a robust security path to secure the lifecycle of ONTs and gateways, protect in-home networks and servers, and leverage our in-built product security.
1. Secure ONTs and Gateways throughout their lifecycle
We protect your customer-premise equipment with proactive lifecycle management, ensuring security from deployment to decommissioning. Regular security patches, firmware updates, and continuous monitoring prevent vulnerabilities and strengthen network resilience. Keep your customer networks safe and secure with automated updates and industry-leading security measures. Our extended security service helps to prolong device use even after devices reach end-of-life.

2. Protect In-Home Networks with CloudSight
Service providers can protect their in-home networks with CloudSight, a cloud-based connectivity management platform. It features:
- Device management identification sets and manages device access, authentication, and authorization.
- Remote provisioning of services and software upgrades keep devices safe, updated, and optimized.
- Blacklisting to prevent access to specific devices or groups. Unauthorized devices are denied access.
- Secure APIs ensure cloud integration. CloudSight connects and interacts securely with other systems, such as a CRM, which involves a lot of personal data.
- Data encryption ensures all stored, used, imported, and exported data are secure.
- Extended Detection and Response (XDR) with CloudSight Secure is available on the server level. With this premium service, a certified security expert supports this additional layer of security and monitors the CloudSight environment 24/7, 365 days a year.
3. Embedded security with partner F-Secure
Our partnership with cybersecurity leader F-Secure offers an additional security layer. The partnership provides state-of-the-art protection seamlessly integrated into Genexis Aura gateways, setting a new standard for home network security. F-Secure’s software, Sense, enables an advanced security solution to be embedded as a container within Genexis’ gateway operating system, IOWRT. Features include:
- Fingerprinting devices to identify each device on the network, transforming cryptic device addresses into recognizable names like “Amazon Alexa” or “Canon Printer.”
- Safe browsing involves verifying the safety of every website a device attempts to access, blocking malicious sites, and preventing harmful downloads.
- Protecting privacy by blocking and tracking URLs from companies like Google and Facebook.
- Detecting botnets and anomalies by recognizing unusual device behavior, such as attempts to connect to unauthorized services, and stopping potential botnet or malware threats.
- Protecting family members by allowing parents to manage internet usage, set specific access times for children, and block inappropriate content.
Our security solutions offer a secure product lifecycle, multi-layered protection for in-home networks and servers, and direct integration in our ONTs and gateways. Genexis will continue to develop resilient and secure solutions for our customers. Together, we are better positioned to respond and prevent unwanted security attacks.