Communication

Security Products – Communication

Krack wifi flaw could compromise IoT devices for decades to come

WPA2 protocol Reverberations of the wifi vulnerability revealed this week could be felt for many years to come, a security researcher has claimed. Speaking to Wired, HD Moore, a network security researcher at Atredis Partners, said: We re probably still going to find vulnerable devices 20 years from now. The rapid proliferation of internet-connected devices, the infrequency of software patches, and multiple barriers to getting users to launch updates mean the vulnerability could compromise IoT security for a long time yet.

The vulnerability exposes wireless internet traffic to malicious eavesdroppers and attacks. Made by Mathy Vanhoef, a security expert at Belgian university KU Leuven, the discovery is not without precedent. However, previous wifi weaknesses were found in wifi protocols that had already been largely superseded by other, more secure protocols. WPA2, by contrast, comfortably remains the most commonly used wireless security protocol. The attack works against all modern protected wifi networks, said Vanhoef in his report. Infrequently if ever updated to guard against vulnerabilities, wireless routers used in the home are seen as problematic. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. Mathy Vanhoef, who discovered the vulnerability All major operating systems, including Android, Linux, Apple and Windows, are affected. If your device supports wifi, it is most likely affected, said Vanhoef, who dubbed the weakness Krack (Key Reinstallation AttaCK).

Attackers who successfully exploit the weakness and mercifully that is difficult to do, say experts can cause havoc in a variety of ways. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted, said Vanhoef. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on. Additionally, depending on the device being used and the network setup, it is also possible to decrypt data sent towards the victim (eg the content of a website). Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. Developers of IoT devices are limited mostly to email or notices on community forums in how they can notify customers and many will only find out via news reports. Some will not find out at all. Users that do become aware of the problem will have to find the patch download and navigate the sometimes irksome login process of the device s web-management interface.

Glimmer of hope But Wired says there is a glimmer of hope in pioneering new mesh-network routers with less convoluted user interface and an auto-update function. This means fixes can be implemented without input from users themselves. In a statement the UK s National Cyber Security Centre, which opened a year ago, sought to reassure the public that using the internet wouldn t necessarily expose them to risk. The attacker would have to be physically close to the target and the potential weaknesses would not compromise connections to secure websites, such as banking services or online shopping. Connections to secure websites, virtual private networks (VPN) and SSH communications are still safe, because the attack is unlikely to affect the security of information sent over the network that is protected in addition to the standard WPA2 encryption. Websites that don t display a padlock icon in the address bar, on the other hand, will create an opening for attackers. The United States Computer Emergency Readiness Team (Cert) issued a warning on Sunday in response to the vulnerability: The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection and others. Android 6.0 (Marshmallow) and Linux are particularly vulnerable because of another bug that results in the encryption key being rewritten as zeros. Not fully implementing the WPA2 protocol iOS and Windows are among the most secure, but no device or software tested has been fully immune to the weakness.

Most tech companies have already had a month and a half to fix the flaw since they were notified of the problem by the international Cert group, based at Carnegie Mellon University, on 28 August. Responding to a request for comment from The Guardian Google said: We re aware of the issue, and we will be patching any affected devices in the coming weeks. Microsoft said: We have released a security update to address this issue.

Customers who apply the update, or have automatic updates enabled, will be protected. Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach? This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now

Global public safety and security market forecast to grow to $537 billion by 2024

In its latest Global Public Safety and Security Market report, NK Wood Research projects the market to grow from $234.57 billion in 2016 to $537.20 billion by 2024. The growth will occur at a compound annual growth rate (CAGR) of 10.91% between 2016 and 2024. According to the report s findings people and enterprises face continuous threats from cyber criminals, natural disasters, and terrorist attacks, which has boosted demand for public safety and security products and services globally.

Governments are contributing to the growth in demand for these goods and services. The global public safety and security market is segmented by products/solutions, services, verticals, and geographical regions. The solutions market is sub-segmented into critical communication networks, surveillance systems, biometric security, authentication systems, scanning and screening systems, C2/C4isr systems, emergency and disaster management, backup and recovery systems, public address and general alarms, and cyber security. Critical communication networks holds largest market share in the global public safety and security market and is expected to continue to be the biggest market over the forecast period. However the emergency and disaster management market is anticipated to grow at the fastest CAGR to 2024. The report splits the market regionally into North America, Europe, Asia-Pacific, and rest of world (ROW). North America was the highest revenue-generating region in 2016, due to spending on defence, compared with other countries. The report anticipates that the riot control equipment market will grow in the US, following the rise in the number of cases of violent related crimes in North America, especially US. This is partly due to availability of guns and rise in violence among street gangs.

Asia Pacific is expected to grow at the highest CAGR during the forecast period. Japan has been the site of some of the worst natural disasters of the 21st century, a phenomenon that has led to the growth of the public safety and security market in the region. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

NSI commissions research into automated alarms

This month the National Security Inspectorate (NSI) has commissioned a study that will examine the public benefits of automated alarms. Perpetuity Research will produce the study, titled Maximising the public benefits of automated alarms . Richard Jenkins, Chief Executive, NSI The NSI s chief executive Richard Jenkins said: The well proven URN1 police response process has long been a great unsung mainstay in private-public sector collaboration, and over the last 10-15 years has contributed dramatically to public safety, and increasing efficiency for police at a time when pressures on resources have never been higher.

However as technology improves, according to Jenkins there are opportunities for moving the success of the police unique reference number (URN) to the next level. The study will aim to identify all the possibilities from canvassing all stakeholders, and will also envision the added benefits that could be achieved from further enhancement. In accordance with the Association of Chief Police Officers (ACPO) policy, police in the UK will only offer a response to verified alarm signals from systems which have been granted a Police unique reference number, so the Police aim to provide an effective response to genuine intruder alarms. Monitored systems can only be installed by certificated providers and must be subject to a maintenance agreement. In 2002/3 NSI appointed Perpetuity Research to produce a report on the causes of false alarms, which subsequently became an important reference point for policy and communication, within the security sector and the police service. We are very excited now 15 years on to be re-visiting the police response model, and helping define how a modern technology can build further on the success to date, Jenkins added. Professor Martin Gill, director of Perpetuity Research said: It is our belief that this independent piece of work can help bring clarity to the table and inform the debate about how further success in police URN can be delivered in the interests of public safety, protection of people and property, and police savings. The findings from the study will be organised on a fast track basis with an initial report available in spring/early summer 2018. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now Related Topics

A comprehensive home security system guide for the elderly

Elderly people and technology are rarely associated with one another, but when it comes to safety and security, modern technology has a great deal to offer. Considering robbery, assault and other crimes against seniors are most likely to occur in or near the home, a comprehensive home security system is particularly important for seniors. A home security system represents an investment in the safety and well-being of your elderly loved ones, and it s important to make sure you re getting the protection they need to be safe at home.

To that end, let s take a look at the most popular home security products for seniors and how they work to keep your loved ones protected. Security cameras In surveys conducted among convicted burglars, more than half admit that they deliberately avoid any home that s equipped with one or more security cameras. That alone is reason enough to consider installing a surveillance system. But the usefulness of security cameras extends well beyond that. Cameras equipped with real-time monitoring also allow elderly homeowners to stay aware of their surroundings, providing much-needed peace of mind and ensuring that they need not leave the house to investigate a suspicious noise or identify a person on their property. Best of all, many smart cameras can even be remotely monitored, allowing you or your family to keep tabs on your loved one and their home no matter where you are. Medical alert systems A medical alert system is a great way to monitor your elderly loved one s health and provide a safeguard in the event of a health emergency, but some systems may offer an added layer of security as well. Many such systems feature pendants or wristbands equipped with buttons that immediately trigger an alarm and request assistance. Though they re designed primarily for medical emergencies, the fact that these systems are constantly monitored and connected with local authorities means help is never more than a button-press away.

Some systems also employ impact sensors that detect when the wearer may have fallen. Home automation Though you may not associate it with home security, smart home automation technology offers a number of ways to keep your loved ones safe. Installing programmable smart locks on doors and windows means your elderly family member never has to worry about remembering to lock up at night or when leaving the home. Many smart locks can also be monitored and controlled remotely from a mobile device. For another layer of security, smart lighting both indoors and outdoors can be programmed or triggered via motion sensors to provide effective deterrence. Remote control access Whether your elderly loved one is a frequent traveler or simply has trouble getting around like they used to, the ability to remotely control various aspects of the home is invaluable. Many modern home security and automation systems can be monitored and controlled via mobile devices, putting everything from video cameras to door locks to window shades just a few taps away. This easy and convenient access means that seniors can take care of many of their normal tasks around the home no matter where they might be. Doorbell cameras A doorbell may not strike you as the ultimate crime-stopping device, but there s a surprising statistic you should consider.

The Los Angeles Police Department recently conducted a study comparing two local neighborhoods one in which homes were equipped with smart doorbell cameras and one in which they weren t. The results? The neighborhood with doorbell cameras saw a stunning 50 percent drop in burglaries. That alone makes a compelling case, but doorbell cameras also protect seniors by ensuring that they need not open up to see who s standing at the door. Most doorbells also offer remote monitoring, so seniors can keep an eye on visitors from virtually anywhere. Alarm systems True home security requires accounting for all manner of potential threats, and this includes things like fire, carbon monoxide and attempted access by an intruder. Fortunately, many home security systems are designed with these threats in mind, providing a range of detectors and alarms to help alert elderly homeowners and give them time to respond appropriately. Ideally, fire and carbon monoxide alarms should be loud enough to alert others nearby in the event that your elderly loved one can t hear the alarm or isn t able to respond on their own. To guard against intruders, motion sensors on doors and windows can trigger alarms in the event of any unexpected activity.

Energy management Staying safe at home doesn t need to be costly. In fact, many home security systems include energy management tools that can actually help you save some cash each month. One popular inclusion is energy monitoring, which allows elderly homeowners to see exactly where their energy dollars are being spent and may even offer suggestions on ways to cut costs. Another energy management solution is a smart thermostat system, which enables programmable settings, activity monitors and other tools to ensure that heating and cooling is done as efficiently as possible without sacrificing comfort. It s no secret that seniors are among the most vulnerable members of society, but that doesn t mean that they can t live safely and securely at home. If you have an elderly loved one living independently, a comprehensive home security system built with their needs in mind is a wise investment. Armed with this knowledge, you can help them choose a solution that will make their lives easier and allow them to feel confident and secure in their home. See here for a directory of home automation companies, products and services About the author: Maricel Tabalba is a freelance writer who is interested in writing about smart gadgets, emerging tech trends and environmentally friendly advice. She earned her Bachelor of Arts in English with a minor in Communication from the University of Illinois at Chicago.

Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now Related Topics

Finalists announced for the Security & Fire Excellence Awards 2017

AWARDS Finalists have been announced for the 2017 edition of the Security & Fire Excellence Awards. The winners will once again be revealed at the London Hilton on Park Lane, on 22 November 2017. The event, which is supported by IFSEC and FIREX International, was sold out in the previous three years so you are advised to book your place as soon as possible.

This year s headline sponsor is Hanwha Techwin, the video surveillance specialist whose flagship brand is the WISENET series of CCTV cameras and equipment. Other sponsors include First Response Group, ICTS UK and Ireland, Oprema, Axis Communications and Honeywell. Find out who won in 2016, when the awards were compered by comedian Jimmy Carr. Here are the confirmed finalists for 2017, chosen from a record number of entries: Access Control Product of the Year (including biometrics) Avigilon Corporation with Access Control Manager (ACM) System with ACM Verify Browser DataScope with Fully-integrated online induction and access control system Doordeck by Doordeck FST Biometrics with IMID Access 4.0 Gallagher Security (Europe) with Gallagher Mobile Connect App Gingers Spark with Micro Power Lock Matrix Comsec with Matrix COSEC DOOR FMX Nedap Security Management with AEOS end-to-end security Paxton Access with Net2 Entry Touch Panel PLATFORMBASE Inc. with ICT Compact Digital Locking System RBH Security Group with RBH AX-R Reader Range Vanderbilt ACT365 Cloud-based Access Control and Video Management Solution ACS Champion of the Year Active Response Security Services Axis Security Cadogan King (Security) (Part of The PCS Group) Effective Security Services Exclusec Security Solutions FGH Security ICTS UK & IRELAND SecuriGroup Services SmartSec Solutions Lovely way to start the week Oculi has made it as a finalist in the Security & Fire Excellence Awards @SecurityXAwards pic.twitter.com/BvQwnpNBbl Luminite Electronics (@LuminitePIR) September 25, 2017 Active Fire Innovation of the Year Accessium with Emergency Evacuations Management System Honeywell Security and Fire with VESDA VEA Nobel Fire Systems with Avantis Fire System Control Panel Ontech Security with Wardiam Pro Fire Trust Security with Haddon Hall, Derbyshire Best Contribution to Standards in the Security Sector Linx International Group Sainsbury s, Mitie, PaS and Sussex Police by Mitie Total Security Management CCTV Camera Equipment of the Year Avigilon Corporation with H4 Mini Dome Axis Communications with AXIS Q1659 Network Camera Dahua Technology Mini Thermal Hybrid Bullet Camera FLIR Systems with PT-Series HD Hanwha Techwin Europe with Wisenet X series of 2MP and 5MP H.265 cameras and domes Hikvision with DarkfighterX Honeywell Security and Fire with equIP camera range Panasonic Business with Aero PTZ Cameras Panasonic Business with WV-X6531N Weatherproof dome camera Reveal with D5 Body Camera Wireless CCTV with WCCTV Body Worn Camera (Connect) CCTV System of the Year (Excluding Cameras and Lens) Abu Dhabi National Exhibition Company (ADNEC) Security System Project Agent Video Intelligence (Agent Vi) with innoVi Edge Avigilon Corporation with Appearance Search Technology Axis Communications with Axis Camera Station Integrator Suite Digital Barriers with SmartVis Identifier Elmdene International with 4HR-UPS Range Guardia Systems for Beirut City Surveillance Project IDIS with IDIS Smart Failover Pelco by Schneider Electric with VideoXpert Professional SECOM with ROGUES (Repeat Offenders Gallery Under Electronic Surveillance) Sunstone IP Systems with Solar IP CCTV System (SICS) Total Integrated Solutions with West Midlands Combined Authority CCTV system Combined Security & Fire Solution of the Year Accessium with eEscape BT Redcare with Redcare Secure Fire IP Gerda Security Products with ACB Project Lazerbeam Fire & Security with The Westbury Hotel, Mayfair Mitie Total Security Management and Vodafone VSOC Securitas UK Securitas UK with University of Hertfordshire Swift Fire & Security with Caffe Nero Combined Staff Safety & Security Project Communication Product of the Year Carlisle Support Services with Work-IT Concorde Security with IFS CSL with DualCom MiniAir Digital Barriers with SmartVis Identifier Matrix Comsec with SARVAM UCS Milestone Systems with Milestone Husky M550A Panasonic Business UK with IP Video Intercom Qognify with Qognify Extend Situm Indoor Positioning StaySafe Lone Worker Safety Terracom Informatics with MyLoneWorkers PRO Verint with Verint Dispatch Manager STM Account Manager Nigel Moss shortlisted for the Security and Fire Excellence Awards Security Manager of the year category. ‘ ‘ ‘ pic.twitter.com/RZEOvpAkd5 STM Group (@STMGroupLtd) September 22, 2017 Corporate Social Responsibility Initiative of the Year Amberstone Technology with Risk Watch Axis Communications with Removing PVC plastics to boost sustainability with Gatwick Airport Dot Dot Dot Property FGH Security Glevum Security Magenta Security Services Swift Fire & Security CSR programme Vigilance Wilson James Counter-Terrorism Innovation of the Year Frontier Pitts with Terra Gates Gatwick Airport Behavioural Detection Team Stratfor with Threat Lens VSG Customer Care Initiative of the Year BusinessWatch Group Chris Lewis Fire & Security with Getting Serious about Customer Service Crystal Peaks Shopping Mall and Retail Park with Customer Care Exclusec Security Solutions FGH Security with Hospitality at the Core of Our Business ICTS UK & IRELAND ISS Facility Services (Security) in collaboration with ATOS Mitie Total Security Management with Eurostar Mitie Total Security Management with Royal Bank of Scotland (RBS) Mitie Total Security Management with Vodafone VPS Home Security Emergency Response Customer Care Initiative Wilson James with Core Customer Values Great news! We’re so proud to be finalists in 3 categories in this year’s Security & Fire Excellence Awards! @SecurityXAwards pic.twitter.com/JMbc5HqtnK Chris Lewis FS (@ChrisLewisFS) September 25, 2017 Cyber Security Innovation of the Year Axis Communications with Ensuring surveillance camera cybersecurity with Dell and Device Authority Genetec with CHAVE IndigoVision with CyberVigilant Nedap Security Management with AEOS end-to-end security Event Security Team of the Year Croma Vigilant Edinburgh International Conference Centre Security Team Effective Security Services Exclusec Security Solutions FGH Security with Worthy View Security Team Glastonbury G4S with One Love Manchester Concert Team Houses of Parliament with Parliamentary Security Department Jaguar Land Rover with Corporate Security & Business Protection Logic Service Management Boston May Fair Event Security Team SecuriGroup Services with Events Division SGC Security Services Intruder Alarm or Exterior Deterrent Product of the Year Ajax Systems with Smart wireless security system Avigilon Corporation with Presence Detector Axis Communications with AXIS D2050-VE Network Radar Detector Chuango Security Technology with Chuango D11 WiFi & Cellular Smart Home Control Enforcer V10 by Pyronix ERA with HomeGuard GJD with Laser-Watch Luminite Electronics with Luminite OCULi Wireless PIR Camera Ontech Security with Wardiam Perimeter Tyco Security Products / Johnson Controls with Visonic GB-502 PG2 Glass Break Detector Large Security Installer of the Year CBES Kings Security Mitie Total Security Management SecuriPlex Thompson AVC Universal Security Systems VPS and VPS Site Security VSG So pleased to be a finalist at the Security and Fire Excellence Awards 2017 https://t.co/8HU9j0lcw4 looking forward to the night! pic.twitter.com/BWH6UBbHBm NW Systems Group (@nwsystemsgroup) September 25, 2017 Passive Fire Innovation of the Year Hilti (Gt. Britain) with Hilti CFS-TTS Firestop top track seal LINIAN with LINIAN Fire Clip Parhelion with LDG StripeLight fireman torch Safe Connect with Hot Connection Indicator Security Consultancy of the Year CornerStone GRG CS Risk Management Future Risk Management Linx International Magenta Security Services MIPL QCIC Group Security Management International VIDEF Security Consulting Security Guarding Company of the Year Over 50M Turnover Axis Security ICTS UK & IRELAND Mitie Total Security Management Wilson James Security Guarding Company of the Year Under 50M Turnover Active Response Security Services CIS Security Croma Vigilant Exclusec Security Solutions FGH Security Global Guardians GMS Security Services Kings Security Magenta Security Services Pilgrims Group SecuriGroup Services Vistech Services Security Manager of the Year Andrew Sindall, Senior Security Manager, SGN David Cox, Security Manager King s Cross Estate, Andrews International Jason Hopwood, UK Strategic Account Manager, Santander by Wilson James Kuldeep Kainth, Security Contract Manager, CIS Security Lee Connelly, The King s School, Canterbury by Sunstone IP Systems Mark Burgin, Head of Security & Risk, Crystal Peaks Shopping Mall and Retail Park Martin Falsey, Physical and Electronic Security Manager, Yorkshire Water Matthew Hollick, Security Manager, Axis Security Muhammad Fahim, Eurostar by Mitie Total Security Management Nigel Moss, Account Manager, STM Group (UK) Paul Brady, Contract Manager, Croma Vigilant Shane Bailey MSyI, Network Rail (High Speed) So proud! TWICE: Qognify is a Finalist for Two Security & Fire Excellence Awards 2017 https://t.co/jPtiHZpNqH Hagar Lev (@hagarlev) September 26, 2017 Security Partnering Initiative of the Year Andrews International with Kings Cross Belfast City Centre Management with Retail Crimewatch CBES/Edesix in partnership with Asda with Body Worn Video System Chroma Vision with Westfield London CornerStone GRG with Google FGH Security with Long Term Brand Contribution iNCENTIVE fm with Bluewater Jaguar Land Rover Corporate Security with GMS Security Services SafetyNet Security Group with Leamington Student Street Marshal Scheme Wilson James with Santander Wilson James with Tate Galleries Security Project or Installation of the Year 2020 Vision Systems with the Yorkshire Seabird Centre, RSPB Bempton Cliffs Axis Communications video monitoring system at Chester Zoo installed by NW Systems Carlisle Support Services with Work-IT for The Royal Wolverhampton NHS Trust CBRE Global Workplace Solutions and the Post Office with Modernising the Post Office (Security Systems) G4S with East Midlands Airport Refurbishment Project Meesons Speed Gate Installation at 55 Colmore Row, Birmingham Panasonic Business with Rethinking CCTV in Regensburg Case Study Qognify with Gatwick Airport Integrated Security SECOM with Co-op iCCTV Sunstone IP Systems with Solar IP CCTV System (SICS) Swift Fire & Security Domestic sprinkler Installation at Nottingham City Homes Springhead and Holwood Court Syntinex with Tinsley House, Gatwick Universal Security Systems with the GHERKIN Security Training Initiative of the Year Active Response Security Services with Security Awareness Programme Banham Academy with Traineeship and Apprenticeship Programme Chris Lewis Fire and Security with Core Values Training CIS Security Academy Development Journey Croma Vigilant with Critical Incident Management Training Crystal Peaks Shopping Mall and Retail Park with Continuous Improvement Houses of Parliament with Conflict Resolution Training ICTS UK & IRELAND with Charter Management Institute programme (CMI) Layer 8 with Layer 8 Toolkit Milestone Systems Learning & Performance Program Pilgrims Group with Lifesafe Training Programme Swift Fire & Security Culture of Compliance Small to Medium Security Installer of the Year 2020 Vision Systems Chris Lewis Fire & Security CSS Systems Lazerbeam Fire & Security Meesons A.I.

Security Engineering Sunstone IP Systems Taylor Technology Systems Tyneside Security The Inspiration in HR Award Axis Group & The Axis Academy CIS Security Securitas Ward Security Wilson James We are over the moon to announce that we are shortlisted for TWO entries in the Security & Fire Excellence Awards 2017! @SecurityXAwards pic.twitter.com/9eAmnKC8cm Lazerbeam F&S (@LazerbeamF_S) September 26, 2017 Related Topics Young professionals: Share your fire-safety ideas and jumpstart your career (and maybe win a prize) Benchmark Innovation Awards 2017: winners revealed Mike Tennent of Tavcom Training wins posthumous industry contribution award all winners revealed

The value of cyber risk assessments and how to reinforce your soft underbelly: your employees

Headlines revealing the latest cyber-attack have cropped up with concerning regularity in 2017. It will therefore come as little surprise to learn that the latest institutions to be found wanting in the cybersecurity department are universities, as reported recently in The Times . Following a Freedom of Information request, the paper discovered that the number of attacks experienced by leading universities has almost doubled in the past two years, with advances in military and energy technology being particularly targeted.

The director of cybersecurity research at the University of Warwick was reported as saying that lax cybersecurity was a problem at many universities. Another security expert claimed this was due to their use of open networks, insufficient investment in both software and staff to monitor security, and the difficulty of managing a range of different networks. While universities are an obvious target for cyber-attacks (many of which appear to be sponsored by nation states) due to their rich seam of research data and inadequate defences, every business should be aware of the damage cybercriminals can inflict by disrupting their operations. The ransomware attack on a range of organisations (including the NHS) demonstrated this only too clearly earlier this year. Protecting your networks from cyber-attacks Cybercriminals are always looking for the chink in the armour so every business must take cybersecurity seriously to avoid becoming a victim. The first step is to carry out a risk assessment to establish what personal data and other confidential data the company holds and how it is used, transmitted and stored. Once you have identified any weak spots where cybercrime poses a particular risk, the next step is to implement security measures to protect your networks from cyber-attacks. Employees are a weak spot It is right to acknowledge that one of your major weak spots is likely to be your employees. You need to put clear procedures in place, encapsulated in a company policy, to deal with the risk of cybercrime.

And all staff should be trained on what steps they can/should take to prevent it. You can insist that any memory sticks, tablets or mobile phones used by employees outside the workplace must be scanned before using them on company network systems. Indeed, you might even consider whether every employee should have permission to use portable media. Companies should bear in mind the reputational damage it might suffer if found to be excessively monitoring employees You can consider taking out insurance or engaging a third party to manage your cybersecurity where the risk of attack is high or the implications particularly severe. Employees use of social media can also compromise your cybersecurity unless you have a clear social media policy that sets out limits to social media use in the workplace. This is particularly relevant where employees work with, or have access to, sensitive information. Individuals right to privacy versus security Naturally, there are implications for companies which need to monitor and store employee information or data. Any such monitoring must be proportionate and carried out in accordance with the Data Protection Act 1998. Individuals rights regarding their data will be further strengthened by the introduction of the General Data Protection Regulation (GDPR) in May 2018.

The Employment Practices Code contains further guidance for businesses on monitoring employees at work. You need to inform employees that they may be monitored and it may be necessary to seek employees express consent in cases where employee communications are being intercepted. Failure to do so could mean a business facing a claim for damages from the sender, recipient or intended recipient of the communication. Employees also have a right to privacy under the Human Rights Act 1998. An employee can bring a claim for unfair dismissal where they believe their dismissal was based on evidence gathered about them through their employer s monitoring equipment that interfered with their right to privacy. Companies should also bear in mind the unquantifiable reputational damage that it might suffer if it is found to be excessively monitoring its employees. All businesses can be badly affected The bottom line, as university cybersecurity chiefs will attest, is to: Carry out a risk assessment Invest in security measures to keep your networks safe Train your staff to understand the risks to the business from cybercriminals Put clear policies in place so everyone knows what they can and cannot do in relation to portable devices and social media use Although cybercrime poses a particularly virulent threat to high-tech research, development and manufacturing organisations, everyone needs to be aware that a cyber-attack can have very serious financial implications for any business. Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach? This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now Related Topics How to follow up sales leads following IFSEC and FIREX International How content marketing is boosting web traffic and engagement in the security industry Many engineers are far more valuable than their managers and their salaries should reflect this

S2 Security launches cloud-based S2 Cumulus

System monitoring S2 Security has launched a cloud-based service for management and monitoring of S2 products as well as critical communication between people, devices and third-party systems. S2 Cumulus features system health monitoring, software license management, remote software updates and automatic alerts to changes in system status. S2 Secuity, a specialist in enterprise physical security solutions says the cloud gives it scope to develop services like virtual credential acquisition and management, video stream sharing, remote mustering and communication with third-party systems.

Integrators, who can organise and view critical information about registered S2 systems from a centralised dashboard, can be notified of changes in system status via email or text message alerts, thereby detecting and resolving problems faster. Software updates and licence management/renewals can be performed remotely thus lowering costs related to onsite visits. S2 Cumulus supports S2 NetBox series access control and event monitoring systems, S2 NetVR series video management systems and the S2 Magic Monitor unified client.

All S2 product lines will become compatible by the end of 2018. Cumulus represents an enormous advantage for S2 system owners, said John L Moss, CEO of the S2 Security. We ve created the backbone for providing new cloud services to our integrators, our end users and our end users people.

Related Topics OPTEX revamps VX Shield (VXS) outdoor intrusion sensor New cloud surveillance brand will revolutionise fight against fraudulent slip, trip and fall claims, says founder Online training tool launched for fire-door inspectors

Deliveries on your doormat even if you re out thanks to a smart new service from ASSA ABLOY and PostNord

In Sweden, a new smart door lock from ASSA ABLOY is making the While you were out delivery card a thing of the past. PostNord customers can now choose to have parcels delivered inside their front door, if it is equipped with an ASSA ABLOY smart lock. It should be simple and convenient to shop online, says Johan Hellman, Head of eCommerce at PostNord.

We ll now be able to deliver items inside the front door in a secure way. The recipient doesn t need to be at home or be available at a particular time, which makes it both simple and convenient. The new service works via a PIN code issued automatically to an authorised PostNord delivery driver. The code opens a recipient s front door just once, so PostNord can leave a parcel on the inside. Now, there s no need for customers to wait in all day, or make a special journey to a collection point. It s another real-world example of smart door locks making life easier. The new service is simple to operate. Customers select home delivery from a participating e-retailer, in the usual way, and approve a specific delivery time slot using their mobile phone. If customers select home delivery inside the front door , their PostNord driver automatically receives a single-use PIN code to open the lock.

The code becomes invalid instantly and automatically after delivery; the customer s phone is notified again when the parcel is delivered. Pilot project A pilot project is already under way in Lerum, near Gothenburg, in conjunction with some of Scandinavia s major e-retailers. Approximately 100 households are trialling this new, ultra-convenient delivery option. With new and innovative products, such as our Yale Doorman lock, customers have an opportunity to simply and securely avail themselves of different services without having to be at home, says Kristoffer Wadman, Director Business Development at ASSA ABLOY Scandinavia. The project illustrates one of many ways a smart door lock can boost convenience and security for everyone. With a smart front door, homeowners no longer have to carry cumbersome keys; there s no need to cut a spare set for a cleaner, the kids or a cat-sitter. With a smart lock, you can let guests in remotely via an app, send them a digital key, or provide a temporary or single-use PIN to open the door. Digital keys are also safer than metal ones: they can t be copied or stolen, and can be instantly revoked if they fall into the wrong hands. Find out more about how smart locks from ASSA ABLOY make in-home delivery with PostNord possible.

embedded content About ASSA ABLOY ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience. Since its formation in 1994, ASSA ABLOY has grown from a regional company into an international group with about 47,000 employees, operations in more than 70 countries and sales close to SEK 71 billion. In the fast-growing electromechanical security segment, the Group has a leading position in areas such as access control, identification technology, entrance automation and hotel security. About PostNord PostNord is the leading supplier of communication and logistics solutions to, from, and within the Nordic region. We ensure the provision of postal services to households and businesses in Sweden and Denmark. With our expertise and strong distribution network, we put in place conditions for tomorrow s communication, e-commerce, distribution and logistics in the Nordic region. In 2015 the Group had 35,000 employees and sales of around SEK 40 billion. The parent company, PostNord AB, is a Swedish public limited company headquartered in Solna, Sweden. Visit us at www.postnord.com.

Related Topics For connected home and residential service providers, smart locks open doors to new opportunities The pioneer behind the world s first unpickable lock: Abloy celebrates 110th birthday At IFA 2017, smart locks open doors to the connected, integrated home services of the future

ONVIF Q&A: Latest profiles, cybersecurity and the Highways England project

ONVIF recently launched a new access control profile a specification for standardising technologies from different vendors to promote integration and interoperability and has another in the pipeline. We asked Stuart Rawling, chairman of the ONVIF communication committee, to tell us what the new profiles were all about. Director of global business development at Pelco as well, Rawling also reflects on ONVIF s raison d etre , its cybersecurity work, keeping pace with the dizzying evolution of technology and the organisation s standardisation work with Highways England.

IFSEC Global: Please tell us about the new profile you launched in July Stuart Rawling: Profile A is a sister profile to what we already had in the access control space. We have released Profile C, which enables device configuration, event and alarm management, and door access control. So you can configure those devices with all that information. Profile A is a higher level system profile, more about granting and revoking credentials, changing privileges. And it has a functionality that better enables integration between access control and video management systems. So it fits side by side with Profile C but provides that higher level with more functionality. IFSEC Global: Is it worth explaining the purpose of these profiles for someone not familiar with them? SR: A profile is a feature set pulled from an ONVIF core specification, which is a master document about standardising and interfacing different products from a variety of different vendors. When the industry moved into the IT space, a lot of manufacturers came up with their own interfaces.

ONVIF standardises those interfaces to make integration easier for all types of users, because you can have product interoperability from different vendors using the same interface. From an integration perspective, installation is easier because you re not having to download different drivers. Manufacturers follow a troubleshooting, testing and conformance process that enables that to be done up front, so the users only need to do the system configuration. From the manufacturers perspective, interoperability investment is lower because they can use these standard interfaces to talk to multiple products. It allows them to instead invest resources into bringing more relevant features and iterations to the product line. embedded content IG: Is it difficult to keep these standards up to date given the rapid pace of technological change? SR: Yes, to some degree. You could say that standards in general tend to lag a little bit behind technology. But it all depends on how we approach it.

If you take our next profile, Profile T, which we re working on now, that s an iteration that takes into account the fact that technology has progressed since we released Profile S a number of years ago. We write these standards to be somewhat technology-agnostic. For example, right now the big buzz is 4K, H.265 and things like that. While Profile T can support that, we re not tied to that standard. If some better codec comes out in the future we can still incorporate it into our ecosystem. Because one of the interfaces may be: What video formats does this device support? And the devices can negotiate in which format to transmit between each other. IG: You recently did some work with Highways England? SR: That s a great end user story.

Highways England have a lot of legacy equipment from different vendors. The organisation is trying to standardise their deployment model for the long term so they can use a set standard in a way that allows them more flexibility. We had a standard in the analogue days: PAL in the UK, so the video was very standardised. They are looking for that level of standardisation. ONVIF has been working with them to develop something that can help large organisations migrate to a standardised approach but that also works for different stakeholders in the process. It s very similar to an initiative in the US called NTCIP National Transportation Communications for ITS Protocol, the standard for traffic management used by the US Department of Transportation. IG: Anything else you want to add about ONVIF? SR: We tend to get a lot of press these days around the cybersecurity aspects of products, especially with the cybersecurity threats we re reading about every single day. This was a recognised concern for ONVIF several years ago.

The manufacturers got together and as part of our core specification we wrote some security policies for manufacturers to follow, as well as providing a standardised interface for execution policies. But of course, good security is a combination of technology and policy. So while manufacturers who have implemented this standard have the technology, we also rely on the end users and consultants to put in best practices in the deployment of that technology.

Related Topics People of interest were known weeks before terrorist incidents but data was part of an unsearched, unstructured archive The panomorph lens will imitate human eyesight and empower AI How public CCTV operators can avoid eye-watering fines under the GDPR

The panomorph lens will imitate human eyesight and empower AI

ImmerVision is a one-of-a-kind company intent on persuading the security industry that its patented panomorph lens is far superior to the widely used fisheye lens. Founded in France in 2000, the company has a large and expanding ecosystem of tech partners, with many surveillance camera developers using its 360-degree panomorph technology. Louis Brun, director of marketing and communications at ImmerVision at the time of the interview (he has since moved on from the company), spoke to IFSEC Global about the applications of 360-degree panomorph lenses including for drones, body-worn video and artificial intelligence and ImmerVision s mission to expound its benefits in the security market and beyond.

IFSEC Global: How did IFSEC 2017 go for ImmerVision? Louis Brun: This year at the show we focused on the latest commercially available 4K panomorph lenses and the launch of new 4K panomorph cameras. The 4K lenses are from Evitar and CBC Computar which are supplying to several camera manufacturers. Because of the availability of these high definition 4k lenses, several manufacturers decided to come out with new products during the show. For example, VIVOTEK came out with a new 4K panomorph camera. If you don t have electroninc image stabilisation, what s the point of a body-worn camera? Are you going to put that on an officer and ask them not to move? We also showed Dahua with their latest 4k panomorph camera, also Hanwha, FLIR, Sony, Brickcom, Vista and many others. The image quality from all of these cameras offers edge-to-edge clarity, consistency and no drop in resolution.

All panomorph cameras are instantly compatible with over 50 VMS software partners. In our demos, we showed live video from the 4K cameras and everyone who saw it was really impressed. The cool thing is that you can see people even their faces as they move around the floor at IFSEC. IG: So IFSEC seems like a great place meet everyone all at once? LB: Absolutely. IFSEC is a key venue for us to meet all our partners and new partners. It is a great place to promote our partners and the fact there s a better alternative to fisheye lenses. I m not putting down anyone who has the fisheye solution; it might work for them. But a lot of people are not satisfied with fisheye.

Every day we have a lot of visitors who are wondering how they can integrate 360. When we show integrators and distributors that there s another option to fisheye, they say: Oh my God, we can get this quality ? IFSEC is the perfect opportunity to educate people and talk about how this technology can help them. IG: Are any other companies doing what ImmerVision does? LB: There are no other technology companies focused on 360 like us. Our technology is being leveraged by several companies in other industries for example ACER with their launch of the Holo360 camera or Motorola and their Mod 360 camera. There are also 6K panomorph broadcast cameras which filmed the Superbowl. I can say that we are world s specialist in 360-degree technology. IG: What about the body-worn video market?

LB: There were quite a few at IFSEC. I have noticed two things about the solutions on the market. Most of them weren t using a quality super wide angle lens. They have some quality on there, but they were lacking one thing which in my humble opinion is important: electronic image stabilisation. Given the variety of off-the-shelf panomorph lenses, you re giving a lot of flexibility to manufacturers to find the combination of cost and resolution they want. If you don t have that, what s the point of a body-worn camera? Are you going to put that on an officer and ask them not to move? They re not the Queen s Guards! Electronic image stabilisation is part of our image processing algorithm.

We showcased how that and our latest panomorph lens are implemented in a body-worn camera solution. The lens used in the body-worn reference design can give you up to 21MP in resolution. It s the size of a one pence coin. That 21MP lens is designed to work with several types of sensors from OmniVision, Sony and Samsung. This gives great flexibility and potential to manufacturers. IG: I m guessing the panomorph lens would be invaluable in the drone market? LB: The drone market is interesting and certain companies are now looking at panomorph lens technology, because again, the quality, the size, so many software solutions are compatible and our ecosystem has probably doubled in two years. This would include chip, sensor, module and product manufacturers. IG: If the panormorph lens is superior performance-wise to fisheye, is it not more expensive too?

LB: The technology has been designed to be competitive and to outperform fisheye. Given the variety of off-the-shelf panomorph lenses, you re giving a lot of flexibility to manufacturers to find the combination of cost and resolution they want. Moreover, those cameras are instantly compatible with any software system in the world. Overall, many of our partners are recognising the value that using our technology brings to them and to the market. We are bringing tools to enable manufacturers to create really cool products which are easily integrated across security, consumer, aerospace, AI, automotive, drones and more. IG: What are the possibilities of this technology in the near future and beyond? LB: There was a big announcement at IFA Berlin about a product using our technology solutions: the first 360 360 camera with LTE, the Holo360. This camera will capture full 360 images that can be shares live online. We re also being pulled into artificial intelligence, robots, drones The panomorph lens will imitate human eyesight and enable an evolution in AI.

ImmerVision is the 360 specialist and we are constantly moving forward. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now Related Topics Fixed cameras will account for less than 50% of surveillance footage in five years time : Milestone CTO on gigantic data and neural networks Deep-learning algorithms, biometric passports and anti-drone technology helping to drive airport revolution TDSi Q&A: The security industry confuses customers with jargon and acronyms