internet

Radiation-blocking underwear and 18 other bizarre smart things that could let hackers into your smart home (and one device to protect you)

No object, however mundane, cannot be improved with a computer chip: this seems to be the philosophy driving development of smart things in the smart home arena. It was partly this scattergun approach that prompted Wired magazine to prophesise the demise of the internet of things (IoT) at the start of 2017. Click on the icons in our infographic below to check out 19 of the most bizarre or according to IoT sceptics pointless devices that are creating new vectors of attack for cybercriminals.

Security is little more than an afterthought on too many devices, with criminals able to guess default usernames and passwords by trawling Google. We haven t chosen these 19 devices based on security some may have very rigorous security mechanisms in place. Rather, we chose the most bizarre devices, and paradoxically, in this context, bizarre also means mundane the point being: is a smart hair brush or smart fork really going to deliver benefits that warrant creating new avenues through which hackers could break into your home network? Several products designed to boost IoT security were launched at CES 2017, suggesting the industry is waking up to the threat. We ve included one of them below flagged with a red icon. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

Wavestore launches version v6.8 of its video management software

VMS Wavestore has launched v6.8 of its open-platform, Linux-based video management software (VMS). The latest incarnation includes support for VMWare ESXi, which brings virtualization to the Wavestore VMS platform. Operators with virtual machines, which can license the VMS via the internet or a virtual-machine dongle, can reduce energy, software, and IT administration costs.

Version 6.8 also introduces to Wavestore s WaveView client software dynamic search and instant display of ad-hoc groups of devices. For instance, type in ground floor will filter down to all devices with ground floor in its name. Our one screen, total control philosophy drives us to ensure that our Partners can seamlessly bring a wide range of technologies together so that operators can easy work day-to-day with Wavestore s VMS , says Julian Inman, Head of Product Management. Wavestore s VMS running in a virtualised environment can even be used in conjunction with traditional Wavestore NVRs/HVRs and the operator can simply see and control the entire mixed group from a single screen if they wish. We bring together multiple devices, such as cameras, access control, intruder detection and advanced analytics; and now multiple server technologies all with the same easy to use front end to deliver a fully scalable and future-proof solution . The latest version of Wavestore s VMS will now integrate with the latest smart IP camera feature sets from Hikvision and Uniview, the AllGoVision analytics suite, while individual detection zones from Optex Redscan detectors can now be associated with specific actions. Now shipping with all new orders, Wavestore v6.8 is available as an upgrade for existing users with active upgrade bundles. The package comes in a block of six successive in-version upgrades without any time limit imposed. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

How is smart technology making businesses more safe and secure?

It s no secret that founding, growing and managing a business takes a lot of determination and hard work. As a business owner, it s common to feel extremely proud yet protective of the business you ve invested a lot of money and time into from the office building itself, to the furniture inside it and the tech-savvy devices you ve purchased to ensure your employees are able to do the best job possible. Thanks to smart technology, businesses are starting to rely on the latest digital trends and developments to stay ahead in their industries.

But, innovative technology and the Internet of things (IoT) is not only making businesses more efficient, it s also being used to improve business safety and security systems. As home-owners we ensure that our houses are burglar-proof and protected against risks and hazards but, as business owners, are we implementing the same safety measures? In fact, with the amount of expensive technology and equipment businesses have, it could be argued that businesses have more to lose if their properties don t have substantial safety and security measures in place. So, how should businesses be using smart technology to keep their property as safe and secure as possible? Use technology to oversee the office remotely Whether you re out of town for a business trip, working from home or on a well-deserved holiday, it s expected for you to feel concerned about whether everything is in order in your absence. With smart technology, business owners are able to put their minds at ease and oversee the office remotely. Smart security systems that connect to cameras, such as Netgear s security camera, enable you to view areas of your office and property straight from a smartphone from anywhere around the world. As smart security cameras develop, more and more are equipped to detect suspicious activity and notify the owner with a simple text or email to their smartphone, and video recording features mean you can replay and watch back footage too. In a similar way to smart security cameras, smart alarm kits work to keep offices safe and secure except with the use of motion sensors or detectors; as soon as a business owner leaves the office for the evening, the kit can be activated and will instantly notify them via smartphone if the alarms are triggered.

With both a security camera and a smart alarm kit working around the clock to keep your property safe and secure when no employees are at work, business owners can focus on running their business rather than worrying about safety and security measures. Your very own flying CCTV This smart tech device is particularly useful for owners of large businesses that occupy a lot of land, such as a factory. Whilst smart security cameras can be set up all around the area, a flying drone can take security levels one step further. Drones can take on watchdog tendencies and patrol your business property; they circulate the land or follow intruders whilst filming any suspicious activity, which is streamed directly to your smartphone. For businesses that aren t as large, a drone might not be necessary so technology such as a smart security light or even a RoboDog could be better suited for your security needs. Kuna s security light combines both a security camera and a light; it starts recording 10 seconds before an event is triggered so you can see the full footage of any suspicious activity, and you can choose what you want to happen when the device is triggered such as sound an alarm or call the police. No key? No problem If you, or a few members of your staff, are guilty of losing your office keys from time to time causing a lot of issues with the risk of burglars and replacing locks and keys smart locks, virtual keys and geofencing technology could be your saviour. Smart security systems allow you and your team to enter and leave the office without a key, as long as you have a smartphone on your person and, let s be honest, who doesn t?

August s smart lock allows multiple people onto its system and supplies each individual with their own virtual key, so they can all lock and unlock a door with just their smartphone. Similarly, geofencing technology defined as a virtual perimeter for a real-world geographic area enables business owners to be notified when someone enters or leaves the property, so any out of hours trespassers will be caught out. As a business owner, your time should be spent on growing your business and managing employees and shouldn t be consumed by concerns over your property s safety and security.

We re already seeing smart technology shape security systems that are making our businesses more burglar and hazard proof than ever before, and we can only expect to see this technology continue to advance.

HID Global unveils HID location services

IFSEC 2017 HID Global, which provides identity technologies, is exhibited its location services in Europe at IFSEC 2017, along with its range of access control systems and other products. The company promoted its newest development, HID Location Services for workforce optimisation, which is designed to meet demand for accurate and real-time location of an organisation s workforce. By combining Internet of Things (IoT) and wireless communication technologies organisations can increase the visibility of the location of their workforce in a facility or building.

The technology can make it possible to analyse the use of rooms for better building management and improvements in operational efficiencies. Future use cases could include building automation capabilities, rich security features and capabilities that facilitate life safety management and compliance. Harm Radstaak, vice president and managing director of physical access control at HID Global, said: HID Location Services extends the traditional capabilities of access control to improve security and area governance within buildings. This new solution underscores our commitment to developing innovative trusted identity solutions that power people, place and things. Other systems and products HID Global showcased included secure door/gate access using smartphones, wearables and tablets via HID Mobile Access, and intelligent visitor management with EasyLobby Solo that only takes 20 seconds to register a visitor, capture detailed information, print a badge and notify someone that a visitor has arrived. HID s parent company, ASSA ABLOY, also showcased new wireless locks that work with HID s Seos credential technology on the stand. And visitors witnessed demonstrations of credential encoding, configuration and management with HID s iCLASS SE CP1000 Encoder and the company s Lumidigm biometrics technology with multispectral imaging, which can read unique fingerprint characteristics from the surface/subsurface of the skin. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

Optex demonstrates five security scenarios for sensors

IFseC 2017 Global sensor manufacturer Optex exhibited different sensor products centred on five security scenarios, including perimeter protection and tailgating detection, during IFSEC 2017. At the security show Optex s stand included a high security perimeter protection zone, where the company demonstrated its CPNI-approved fibre optic fence detection system, Fiber Sensys FD-322 series. The system detects intruders climbing or cutting through a fence.

Optex s REDSCAN RLS-3060 creates another layer of security around the perimeter fence to warn if a person or vehicle is approaching the fence. The company s perimeter intrusion detection systems are integrated with the GEMOS PSIM platform to trigger video surveillance drones to fly to the point at which the intrusion is occurring and send a live video stream to a control centre. In a second zone, Optex demonstrated its time of flight technology, where a scene is mapped in 3D to give an accurate representation of the objects present. The technology is used in Accurance 3D, Optex s tailgating detection system for interlocks. Other applications include object protection. Also at the show, Optex s REDSCAN RLS-2020 was on display, for visitors to see how the technology can protect assets and detect people jumping over turnstiles or climbing through skylights. REDSCAN RLS-2020 is already proven in identifying small objects or thrown objects being smuggled into restricted areas. For commercial and residential security, Optex also exhibited its new wireless infrared beam, the SL-TNR that works with universal batteries (CR123). The product can be partly hardwired.

The fifth zone included demonstrations of Optex s wireless outdoor sensors used in Internet of Things applications, for sending alarms and other data via the cloud to a smartphone, or to a remote monitoring station. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

We need joint cyber-physical teams for cyber-physical alerts

IFSEC presentations James Willison BA, MA, MSyI is a respected specialist in security convergence and enterprise risk management. Also founder of Unified Security Ltd, Willison is speaking at IFSEC 2017 about How vendors can support ESRM and CSM strategies and What security managers need to know about cybersecurity . We caught up with James to find out a little more about these topics in advance of Europe s largest annual security show.

IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. IFSEC Global: Hi, James, please tell us a bit about what you ll be talking about at IFSEC with Sarb Sembhi James Willison: We re going to be talking about how vendors can support enterprise security risk management. There s lots happening in the corporate strategy of bringing risk silos together and identifying cyber-physical attacks which is great. However, how can vendors help them better achieve this? Can they provide technologies which will actually calculate enterprise security risks? How can they make sure they re supplying secure software and secure technology? We ll also cover the strategic side of security management. So security managers, what do they do on their side?

How do they manage technology they re going to buy, how do they know it s good rather than bad so looking at principles really. It s high level strategy rather than technical. We won t be giving details on all the firewall stuff or what sort of software you re using. It s more about what sort of thing you should be looking for and relationships between suppliers and installers and what impressions they re giving the client. I m doing that talk with Sarb Sembhi. What we re saying to vendors is you ve got an opportunity to lead the market in identity access management because the information security guys aren t really doing it on a large scale IG: And what about your talk, alongside Steven Kenny of Axis Communications, about cybersecurity? JW: We ll be talking about what Axis are doing, which I know quite a lot about because I m working with them. Steve will cover hardening the cybersecurity of their products and systems and I will look at how these should be managed in an enterprise or smart city. And I ll be giving a strategic look at multi-disciplinary security teaming, which is what converged security really is.

But basically I ll be saying that people have talked about convergence quite a lot in the last few years, all over the world. But what we need is united cyber-physical teams working in tandem on cyber-physical alerts. Barclays recently merged their physical and cybersecurity teams into one big security team with technology that is cyber-physical and responding in real time. The highest level of achievement in this area would be them, Deutsche Telekom and BT. Some corporations are doing this converged security management but others are doing enterprise security, which is looking at all security risks but their teams are still siloed. So they re looking at all security risks but separately. What we re advocating is that even if you can t form one big department because of organisational problems, you form a separate team that includes both information and physical security people not just one or the other. CISOs tend not to think physical security systems providers really have the capability to offer cyber-physical security solutions IG: At least it makes sure they re talking to each other JW: Yes. I know these teams exist, but they re quite rare.

In our talk we consider how these teams can use converged technologies to respond to attacks on their physical security systems. We look at important actions to take in this area and this will be of particular relevance for security professionals working in the smart cities of the future. Out of interest, South Korea, a leader in smart cities, had an InfoSec type show recently and they had 15-20,000 information security people there, with 28,000 physical. So that was interesting as they discussed cyber-physical security, convergence, IoT and new technologies. Something to watch IG: Why do you think there is so little take up of cyber-physical security offerings from physical security vendors? JW: I think because the people looking after that would usually be the chief information security officer, and they don t think physical security systems providers really have the capability to offer cyber-physical security solutions. These vendors have specialised in physical up until now and to get into that market is quite hard because there are a lot of information security type access systems, obviously for IT, but identity access management is a big part of that. I think some of that will converge. I ve been to conferences where they talk about identity access management all day because it s on the network.

Then there are loads of products around that and some will include a physical element. What we re saying in our talk is you ve got an opportunity to lead the market because the information security guys aren t really doing it on a large scale. It s a growth area. And the internet of things obviously will impact all this. IG: Could you just clarify the kind of security professionals who will benefit from the talk? JW: We have a three-pronged approach. What you should be doing in your organisation to converge or have multi-disciplinary teams and how you can do that. You can take the initiative by going to HR and saying you want to form one, can you help me, because maybe I m not getting help from the IT people. So that shows initiative, to see what they say back before they come back and make you do it anyway.

HR might just realise they can form one department to save money. They no longer need two security functions. That s been an issue in the past. Someone tells them they need only one person to run the whole security department to include every area of security. There s this fear that all the chief information security guys are going to take over physical security. A lot of jobs are now advertised in this area, when you dig deep into them they re looking for chief information security officers. The IT companies don t see the point of siloing off. They tend to be more digitalised and, well, you need to know about IT anyway. But if you don t know about it, what are you doing here?

IG: As ever, it sounds like the technology is evolving faster than the corporate culture can keep up with. Is there anything else you want to mention? JW: Just that we re publishing a white paper with Axis on this subject, called Supporting Enterprise Security Risk Management, How vendors can support ESRM and CSM strategies . We are delighted to announce that this will be launched at IFSEC and available as a PDF on the Axis website (click here) or if you contact me at [email protected] We hope to have some printed copies for those who attend our presentation! So please come and get a copy! James Willison is speaking twice at IFSEC 2017: 20 June / 14:00-14:40 / Supporting Enterprise Security Management How vendors can support ESRM and CSM strategies / James Willison and S arb Sembhi, CTO & CISO, Virtually Informed / Borders & Infrastructure Theatre 21 June / 13:30-13:55 / What security managers need to know about cybersecurity / James Willison and Steven Kenny, Axis Communications / Security Management Theatre View the full conference agenda here IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out

MmWave technology and its powerful role in CCTV

In recent years, there has been incredible growth in the video surveillance market with law enforcement agencies harnessing CCTV to enhance security in problematic areas across cities. But these projects require connectivity to carry video feeds from multiple deployed cameras distributed over one or more sites, to the control room for viewing and recording and analysis. Because of network congestion and interference issues, it is critical for transmission technology capabilities to improve.

Below, three systems integrators discuss the challenges they face with network CCTV projects and how millimeter wave technology has helped them provide the speed, capacity and connectivity needed for today s data-heavy security system deployments. Q: What are some of the challenges inherent in designing and installing video surveillance systems? Marc Hancock, technical director, Net View Systems : There is so much noise, as we like to call it, or traffic on traditional wireless networks (sub-6 GHz networks) that interference proves to be quite a common problem. Obviously, that is a significant issue when the wireless network is part of a city s critical infrastructure, used for its CCTV security. CCTV security deployments require high reliability and availability in order for the CCTV system to prove truly effective but with traditional wireless networks, there is often not enough bandwidth or reliability to deliver the camera responsiveness required. Craig Lerman, president and CEO, LTW : Reliability is paramount when you are working in the public safety space, no matter what the current weather or ambient radio frequency environment is outside. It is critical that wireless network-based surveillance solutions are engineered properly for the environment in which they are operating. In addition, the wireless network components must be resilient, temperature hardened and be designed to operate in the target environment. Public safety networks employ mission critical voice, data and video solutions that cannot lock up or go offline during a storm.

Nick Metcalfe, technical sales, TrellisWorks : Five years ago, two megabytes per second (mbps) was enough bandwidth for each camera on a traditional wireless CCTV network. As camera technology has progressed, that number has gone up significantly. Today, each camera requires anywhere from 10 to 32 mbps of bandwidth, due to the high resolution of 1080p HD cameras and the addition of analytics and other tools. When designing an enterprise or town CCTV network, you can very quickly need 100 mbps. Getting that much bandwidth on a traditional 5 GHz wireless network is very difficult. Find out more about this technology at IFSEC International, 20-22 June 2017, London ExCeL. Siklu, which develops, builds and delivers the best millimeter wave wireless connectivity radios on the planet , is exhibiting on stand E750 . Get your free badge now. Q: How is millimeter wave technology affecting your surveillance projects and designs?

What is it helping you do that you couldn t achieve before? MH, Net View: MmWave has provided huge cost savings, while delivering a better network and higher video resolution to the customer. We began using mmWave to address the interference experienced on traditional wireless networks, particularly with our city CCTV and traffic projects, and also with critical infrastructure customers, such as power companies. The mmWave backhaul links that we are using for security deployments are cost effective for us as a company and for our end users due to the power and speed of mmWave technology. We can install fewer links or hops as a result. For some projects, we also previously had to lease Internet Service Provider (ISP)-controlled fiber lines for customers to get the required reliability, capacity and speed. Because of mmWave s fiber-like performance, we can use the radios to replace fiber lines, which provides cost reductions and allows us to directly design and control the entire network. CL, LTW: We have been using millimeter wave for a while now and have deployed many links in our larger city-wide deployments. We recently deployed millimeter wave radios in our project with the City of Bethlehem, Pa, for the Hoover-Mason Trestle, which is a recreational walking path 40 feet above the ground at an old steel mill that has been converted to an entertainment venue.

Obviously, there was concern for visitor safety due to the height of the walkway and its use at night, so LTW installed millimeter wave radios for increased bandwidth and throughput for the site s video surveillance system, addressing a lot of the same issues that we mentioned above: bandwidth loads, throughput speeds and reliability and durability in extreme weather conditions. We have found that millimeter wave is really the most cost effective way to access high capacity throughput. The attractive price with the high performance make it a perfect fit for video surveillance wireless networks. Currently, you can buy millimeter wave radios with five GB/sec throughput, which will soon be 10 GB/sec throughput, which is as fast as fiber. Millimeter wave radios have the right form factor, capacity and scalability for the ever-evolving video surveillance systems of today. Craig Lerman, president and CEO, LTW NM, TrellisWorks: As the density of deployment in the 5 GHz frequency band increased, we began using mmWave radio links because the mmWave frequency bands can provide much greater throughput for wireless CCTV systems and at a very affordable price. With mmWave, you never run out of bandwidth and you always have the ability to change an uplink or downlink as needed. Interference from other networks is a rare occurrence. In our designs, we often use a combination of mmWave radio links in conjunction with traditional 5 GHz links, depending on the nature of the project.

Now, we are seeing a trend in which many town councils are replacing leased fiber infrastructure with wireless networks that use mmWave radios for their CCTV systems. The speed and bandwidth are nearly the same as fiber, but the cost is significantly less. Q: Do you expect that adoption of mmWave technology will increase within the physical security industry? MH, Net View: Many of Net View s security projects involve traffic light control systems and variable message signs near roadways as part of a city s CCTV security network. Obviously one can t trench fiber in all of those locations and even when it is possible, it is costly. Since its prices have decreased significantly in the last few years, mmWave technology has become the best choice when fiber is not an option. It is the underlying network design and topology that makes a security system effective and mmWave is allowing us to provide the powerful network needed for today s bandwidth-heavy CCTV systems. CL, LTW: CCTV is being driven by the need for capacity and millimeter wave lends itself perfectly for that application, especially when priced competitively. Millimeter wave radios have the right form factor, capacity and scalability for the ever-evolving video surveillance systems of today.

In addition, the millimeter wave frequency band enables high density deployments without the frequency re-use limitations imposed by lower frequency (sub 6 GHz) solutions. NM, TrellisWorks: As I mentioned, many cities are considering replacing fiber or traditional wireless networks with mmWave technology and in general, the need for higher capacity and more robust wireless CCTV networks is certainly increasing. Through rapid product development, Siklu enables integrators like TrellisWorks to meet our customers demands and requirements. In the future, I think we will see more interest from systems integrators in deploying mmWave links because of how effective mmWave is and because it is easy to install. Ofcom is the UK regulatory body for communications and it requires systems integrators to register all wireless networks and links. Five years ago, there were a few hundred registered mmWave links. Today, there are thousands and that number is only going to continue to grow as technology advances and bandwidth demands increase. Find out more about this technology at IFSEC International, 20-22 June 2017, London ExCeL. Siklu, which develops, builds and delivers the best millimeter wave wireless connectivity radios on the planet , is exhibiting on stand E750 .

Get your free badge now. Meet the integrators LTW: Pine Brook, NJ, United States Specialty: systems integration for wireless, network, security and energy solutions. Primary focus in public safety deployments, including law enforcement, municipal and state and local government. Net View Systems: Bradford, West Yorkshire, United Kingdom Specialty: designing and installing integrated electronic security systems and their infrastructure, including traditional analogue systems and High Definition and IP systems. TrellisWorks, Ltd.: Thatcham, Berkshire, United Kingdom Specialty: designing and installing comprehensive network wireless solutions, radio and 4G communications, IT support maintenance, mobile data routing and simulation. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals. Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

OPTEX to showcase REDSCAN RLS-3060 and CPNI-approved Fiber Sensys FD-322 at IFSEC 2017

Perimeter sensors At IFSEC International in June global sensor producer OPTEX will exhibit a range of products and technologies in live demos. Each demonstration is tailored to different applications, including perimeter protection, tailgating detection as well as Internet of Things (IOT) alarm systems. Within its high security perimeter protection zone, OPTEX will demonstrate its CPNI-approved fibre optic fence detection system, Fiber Sensys FD-322.

The system detects intruders climbing above or cutting through a fence. OPTEX s REDSCAN RLS-3060 creates a layer of security around the perimeter fence to warn if anyone or any vehicle is approaching the fence. The perimeter intrusion detection systems are integrated with the GEMOS PSIM platform so they can trigger video surveillance drones to fly to the point of intrusion and send a live video stream to the control centre. In a second zone, OPTEX will be demonstrate its time of flight technology that allows a scene to be mapped in 3D giving an accurate representation of the objects present. The technology is used in Accurance 3D, OPTEX s tailgating detection system for interlocks. Potential applications include object protection. Laser scan detector REDSCAN RLS-2020 will also be on the stand. The technology protects assets and detects people jumping over turnstiles or climbing through skylights as well as detects thrown objects being smuggled into restricted areas. For commercial and residential security, OPTEX will exhibit its new wireless infrared beam, the SL-TNR.

The last zone will include demonstrations of how OPTEX s wireless outdoor sensors can be used in IoT applications, by sending alarms and other data via the cloud to a smartphone, for instance. Jacques Vaarre, managing director of OPTEX, EMEA, says that live demos are the best way to show the range of applications that can be achieved with the firm s sensors. Check out OPTEX s latest products at IFSEC International, 20-22 June 2017, London ExCeL. You can find them on stand E600. Get your free badge now. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

CEDIA advises on smart wiring

Due to today s ever growing reliance on digital and smart appliances, security professionals are facing greater pressure to install complex cabling infrastructures needed to support smart home technology. Simon Buddle, Education Director at CEDIA EMEA, highlights the importance of installing an efficient and secure residential cabling system. He explains how professionals can provide clients with the right cabling requirements for the modern home of today and tomorrow.

Wiring in the evolving smart home Technology is increasingly infiltrating the home. With virtually all household technologies part of the home network, a simple phone line and TV antenna is no longer adequate to support the technology that is now available to homeowners. As a result, many require comprehensive wiring infrastructures and data network systems that are suitable for the modern smart home. In order to prevent opportunists from doing it themselves , it s crucial for security professionals to offer a a service that benefits homeowners. A correctly wired infrastructure at the very first stage of building or renovating is fundamental to homeowners who want technology. A common phrase heard among the home technology industry is the most expensive cable you have to install is the one that did not get installed in the first place . The basis of a smart home is the infrastructure, the cables. Not all properties require technology at this stage. But it is crucial for the correct wiring to be in place so that it is ready for the future.

A wired infrastructure can set up the home for future applications, whilst still preserving the d cor of the home and adding value. The rise of smart wiring presents a great opportunity for security professionals. The home technology sector presents a lucrative opportunity for these professionals to expand their reach and create new business. By offering a more complete service for the home, including specialist services, such as fitting reliable cabling infrastructure, security professionals can guarantee their businesses will be more resilient. It could help them through tough times as they pick up more work from new and existing customers. CEDIA s smart wiring education To make sure security professionals are up-to-date with the latest skills and knowledge, CEDIA has best practice advice for wiring smart homes. CEDIA has a number of courses for those who want to extend their cabling knowledge. One of their most popular education programmes is its one day Smart Home Wiring course. Attendees learn how to plan and install a wireless infrastructure that can withstand and integrate a range of modern technological demands.

Based on the Smart Home Infrastructure Recommended Guidelines , it promises to leave attendees with a clear understanding of how a modern home should be cabled for new technologies, and future flexibility. CEDIA s the Smart Home Infrastructure Recommended Guidelines is perfect for security professionals looking to move into the home technology market or gain a wider understanding of the subject. The document aims to help security professionals understand the comprehensive cabling infrastructure required for the modern home. It sets out a plan for a far more integrated and modern approach to wiring homes. CEDIA at IFSEC CEDIA is hosting a number of training sessions at IFSEC International 2017. The 90 minute training sessions will take place in South Gallery Suite 8 at ExCeL on 20 th and 21 st of June: 20th June: Introduction To Smart Home Technology IP Networking for the Smarthome WiFi Tips & Tricks For The Modern Home Intro to Audio, Video & Home Entertainment 21st June: Introduction To Smart Home Technology Building A Business In The Smart Home Marketplace Panel Discussion Lighting Control For The Secure Home Wiring Infrastructure For The Modern Home For more information on what advice, courses and literature CEDIA can offer security professionals, please visit www.cedia.co.uk Be smart come to IFSEC International 2017 The Internet of Things (IoT) is becoming an ever important element of various technology solutions for the smart home. The ability to connect, communicate with, and remotely manage a vast number of networked, automated devices via the internet is now inescapable.

This June, the latest smart products are on hand to test and trial throughout the exhibition as well as a dedicated smart seminar theatre, and training sessions on the show floor.

To avoid missing out register here

GAO WEST NILE VIRUS OUTBREAK.

Lessons for Public Health …

Transcription

1 GAO United States General Accounting Office Report to Congressional Requesters September 2000 WEST NILE VIRUS OUTBREAK Lessons for Public Health Preparedness GAO/HEHS