We need joint cyber-physical teams for cyber-physical alerts

IFSEC presentations James Willison BA, MA, MSyI is a respected specialist in security convergence and enterprise risk management. Also founder of Unified Security Ltd, Willison is speaking at IFSEC 2017 about How vendors can support ESRM and CSM strategies and What security managers need to know about cybersecurity . We caught up with James to find out a little more about these topics in advance of Europe s largest annual security show.

IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. IFSEC Global: Hi, James, please tell us a bit about what you ll be talking about at IFSEC with Sarb Sembhi James Willison: We re going to be talking about how vendors can support enterprise security risk management. There s lots happening in the corporate strategy of bringing risk silos together and identifying cyber-physical attacks which is great. However, how can vendors help them better achieve this? Can they provide technologies which will actually calculate enterprise security risks? How can they make sure they re supplying secure software and secure technology? We ll also cover the strategic side of security management. So security managers, what do they do on their side?

How do they manage technology they re going to buy, how do they know it s good rather than bad so looking at principles really. It s high level strategy rather than technical. We won t be giving details on all the firewall stuff or what sort of software you re using. It s more about what sort of thing you should be looking for and relationships between suppliers and installers and what impressions they re giving the client. I m doing that talk with Sarb Sembhi. What we re saying to vendors is you ve got an opportunity to lead the market in identity access management because the information security guys aren t really doing it on a large scale IG: And what about your talk, alongside Steven Kenny of Axis Communications, about cybersecurity? JW: We ll be talking about what Axis are doing, which I know quite a lot about because I m working with them. Steve will cover hardening the cybersecurity of their products and systems and I will look at how these should be managed in an enterprise or smart city. And I ll be giving a strategic look at multi-disciplinary security teaming, which is what converged security really is.

But basically I ll be saying that people have talked about convergence quite a lot in the last few years, all over the world. But what we need is united cyber-physical teams working in tandem on cyber-physical alerts. Barclays recently merged their physical and cybersecurity teams into one big security team with technology that is cyber-physical and responding in real time. The highest level of achievement in this area would be them, Deutsche Telekom and BT. Some corporations are doing this converged security management but others are doing enterprise security, which is looking at all security risks but their teams are still siloed. So they re looking at all security risks but separately. What we re advocating is that even if you can t form one big department because of organisational problems, you form a separate team that includes both information and physical security people not just one or the other. CISOs tend not to think physical security systems providers really have the capability to offer cyber-physical security solutions IG: At least it makes sure they re talking to each other JW: Yes. I know these teams exist, but they re quite rare.

In our talk we consider how these teams can use converged technologies to respond to attacks on their physical security systems. We look at important actions to take in this area and this will be of particular relevance for security professionals working in the smart cities of the future. Out of interest, South Korea, a leader in smart cities, had an InfoSec type show recently and they had 15-20,000 information security people there, with 28,000 physical. So that was interesting as they discussed cyber-physical security, convergence, IoT and new technologies. Something to watch IG: Why do you think there is so little take up of cyber-physical security offerings from physical security vendors? JW: I think because the people looking after that would usually be the chief information security officer, and they don t think physical security systems providers really have the capability to offer cyber-physical security solutions. These vendors have specialised in physical up until now and to get into that market is quite hard because there are a lot of information security type access systems, obviously for IT, but identity access management is a big part of that. I think some of that will converge. I ve been to conferences where they talk about identity access management all day because it s on the network.

Then there are loads of products around that and some will include a physical element. What we re saying in our talk is you ve got an opportunity to lead the market because the information security guys aren t really doing it on a large scale. It s a growth area. And the internet of things obviously will impact all this. IG: Could you just clarify the kind of security professionals who will benefit from the talk? JW: We have a three-pronged approach. What you should be doing in your organisation to converge or have multi-disciplinary teams and how you can do that. You can take the initiative by going to HR and saying you want to form one, can you help me, because maybe I m not getting help from the IT people. So that shows initiative, to see what they say back before they come back and make you do it anyway.

HR might just realise they can form one department to save money. They no longer need two security functions. That s been an issue in the past. Someone tells them they need only one person to run the whole security department to include every area of security. There s this fear that all the chief information security guys are going to take over physical security. A lot of jobs are now advertised in this area, when you dig deep into them they re looking for chief information security officers. The IT companies don t see the point of siloing off. They tend to be more digitalised and, well, you need to know about IT anyway. But if you don t know about it, what are you doing here?

IG: As ever, it sounds like the technology is evolving faster than the corporate culture can keep up with. Is there anything else you want to mention? JW: Just that we re publishing a white paper with Axis on this subject, called Supporting Enterprise Security Risk Management, How vendors can support ESRM and CSM strategies . We are delighted to announce that this will be launched at IFSEC and available as a PDF on the Axis website (click here) or if you contact me at [email protected] We hope to have some printed copies for those who attend our presentation! So please come and get a copy! James Willison is speaking twice at IFSEC 2017: 20 June / 14:00-14:40 / Supporting Enterprise Security Management How vendors can support ESRM and CSM strategies / James Willison and S arb Sembhi, CTO & CISO, Virtually Informed / Borders & Infrastructure Theatre 21 June / 13:30-13:55 / What security managers need to know about cybersecurity / James Willison and Steven Kenny, Axis Communications / Security Management Theatre View the full conference agenda here IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out

MmWave technology and its powerful role in CCTV

In recent years, there has been incredible growth in the video surveillance market with law enforcement agencies harnessing CCTV to enhance security in problematic areas across cities. But these projects require connectivity to carry video feeds from multiple deployed cameras distributed over one or more sites, to the control room for viewing and recording and analysis. Because of network congestion and interference issues, it is critical for transmission technology capabilities to improve.

Below, three systems integrators discuss the challenges they face with network CCTV projects and how millimeter wave technology has helped them provide the speed, capacity and connectivity needed for today s data-heavy security system deployments. Q: What are some of the challenges inherent in designing and installing video surveillance systems? Marc Hancock, technical director, Net View Systems : There is so much noise, as we like to call it, or traffic on traditional wireless networks (sub-6 GHz networks) that interference proves to be quite a common problem. Obviously, that is a significant issue when the wireless network is part of a city s critical infrastructure, used for its CCTV security. CCTV security deployments require high reliability and availability in order for the CCTV system to prove truly effective but with traditional wireless networks, there is often not enough bandwidth or reliability to deliver the camera responsiveness required. Craig Lerman, president and CEO, LTW : Reliability is paramount when you are working in the public safety space, no matter what the current weather or ambient radio frequency environment is outside. It is critical that wireless network-based surveillance solutions are engineered properly for the environment in which they are operating. In addition, the wireless network components must be resilient, temperature hardened and be designed to operate in the target environment. Public safety networks employ mission critical voice, data and video solutions that cannot lock up or go offline during a storm.

Nick Metcalfe, technical sales, TrellisWorks : Five years ago, two megabytes per second (mbps) was enough bandwidth for each camera on a traditional wireless CCTV network. As camera technology has progressed, that number has gone up significantly. Today, each camera requires anywhere from 10 to 32 mbps of bandwidth, due to the high resolution of 1080p HD cameras and the addition of analytics and other tools. When designing an enterprise or town CCTV network, you can very quickly need 100 mbps. Getting that much bandwidth on a traditional 5 GHz wireless network is very difficult. Find out more about this technology at IFSEC International, 20-22 June 2017, London ExCeL. Siklu, which develops, builds and delivers the best millimeter wave wireless connectivity radios on the planet , is exhibiting on stand E750 . Get your free badge now. Q: How is millimeter wave technology affecting your surveillance projects and designs?

What is it helping you do that you couldn t achieve before? MH, Net View: MmWave has provided huge cost savings, while delivering a better network and higher video resolution to the customer. We began using mmWave to address the interference experienced on traditional wireless networks, particularly with our city CCTV and traffic projects, and also with critical infrastructure customers, such as power companies. The mmWave backhaul links that we are using for security deployments are cost effective for us as a company and for our end users due to the power and speed of mmWave technology. We can install fewer links or hops as a result. For some projects, we also previously had to lease Internet Service Provider (ISP)-controlled fiber lines for customers to get the required reliability, capacity and speed. Because of mmWave s fiber-like performance, we can use the radios to replace fiber lines, which provides cost reductions and allows us to directly design and control the entire network. CL, LTW: We have been using millimeter wave for a while now and have deployed many links in our larger city-wide deployments. We recently deployed millimeter wave radios in our project with the City of Bethlehem, Pa, for the Hoover-Mason Trestle, which is a recreational walking path 40 feet above the ground at an old steel mill that has been converted to an entertainment venue.

Obviously, there was concern for visitor safety due to the height of the walkway and its use at night, so LTW installed millimeter wave radios for increased bandwidth and throughput for the site s video surveillance system, addressing a lot of the same issues that we mentioned above: bandwidth loads, throughput speeds and reliability and durability in extreme weather conditions. We have found that millimeter wave is really the most cost effective way to access high capacity throughput. The attractive price with the high performance make it a perfect fit for video surveillance wireless networks. Currently, you can buy millimeter wave radios with five GB/sec throughput, which will soon be 10 GB/sec throughput, which is as fast as fiber. Millimeter wave radios have the right form factor, capacity and scalability for the ever-evolving video surveillance systems of today. Craig Lerman, president and CEO, LTW NM, TrellisWorks: As the density of deployment in the 5 GHz frequency band increased, we began using mmWave radio links because the mmWave frequency bands can provide much greater throughput for wireless CCTV systems and at a very affordable price. With mmWave, you never run out of bandwidth and you always have the ability to change an uplink or downlink as needed. Interference from other networks is a rare occurrence. In our designs, we often use a combination of mmWave radio links in conjunction with traditional 5 GHz links, depending on the nature of the project.

Now, we are seeing a trend in which many town councils are replacing leased fiber infrastructure with wireless networks that use mmWave radios for their CCTV systems. The speed and bandwidth are nearly the same as fiber, but the cost is significantly less. Q: Do you expect that adoption of mmWave technology will increase within the physical security industry? MH, Net View: Many of Net View s security projects involve traffic light control systems and variable message signs near roadways as part of a city s CCTV security network. Obviously one can t trench fiber in all of those locations and even when it is possible, it is costly. Since its prices have decreased significantly in the last few years, mmWave technology has become the best choice when fiber is not an option. It is the underlying network design and topology that makes a security system effective and mmWave is allowing us to provide the powerful network needed for today s bandwidth-heavy CCTV systems. CL, LTW: CCTV is being driven by the need for capacity and millimeter wave lends itself perfectly for that application, especially when priced competitively. Millimeter wave radios have the right form factor, capacity and scalability for the ever-evolving video surveillance systems of today.

In addition, the millimeter wave frequency band enables high density deployments without the frequency re-use limitations imposed by lower frequency (sub 6 GHz) solutions. NM, TrellisWorks: As I mentioned, many cities are considering replacing fiber or traditional wireless networks with mmWave technology and in general, the need for higher capacity and more robust wireless CCTV networks is certainly increasing. Through rapid product development, Siklu enables integrators like TrellisWorks to meet our customers demands and requirements. In the future, I think we will see more interest from systems integrators in deploying mmWave links because of how effective mmWave is and because it is easy to install. Ofcom is the UK regulatory body for communications and it requires systems integrators to register all wireless networks and links. Five years ago, there were a few hundred registered mmWave links. Today, there are thousands and that number is only going to continue to grow as technology advances and bandwidth demands increase. Find out more about this technology at IFSEC International, 20-22 June 2017, London ExCeL. Siklu, which develops, builds and delivers the best millimeter wave wireless connectivity radios on the planet , is exhibiting on stand E750 .

Get your free badge now. Meet the integrators LTW: Pine Brook, NJ, United States Specialty: systems integration for wireless, network, security and energy solutions. Primary focus in public safety deployments, including law enforcement, municipal and state and local government. Net View Systems: Bradford, West Yorkshire, United Kingdom Specialty: designing and installing integrated electronic security systems and their infrastructure, including traditional analogue systems and High Definition and IP systems. TrellisWorks, Ltd.: Thatcham, Berkshire, United Kingdom Specialty: designing and installing comprehensive network wireless solutions, radio and 4G communications, IT support maintenance, mobile data routing and simulation. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals. Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

OPTEX to showcase REDSCAN RLS-3060 and CPNI-approved Fiber Sensys FD-322 at IFSEC 2017

Perimeter sensors At IFSEC International in June global sensor producer OPTEX will exhibit a range of products and technologies in live demos. Each demonstration is tailored to different applications, including perimeter protection, tailgating detection as well as Internet of Things (IOT) alarm systems. Within its high security perimeter protection zone, OPTEX will demonstrate its CPNI-approved fibre optic fence detection system, Fiber Sensys FD-322.

The system detects intruders climbing above or cutting through a fence. OPTEX s REDSCAN RLS-3060 creates a layer of security around the perimeter fence to warn if anyone or any vehicle is approaching the fence. The perimeter intrusion detection systems are integrated with the GEMOS PSIM platform so they can trigger video surveillance drones to fly to the point of intrusion and send a live video stream to the control centre. In a second zone, OPTEX will be demonstrate its time of flight technology that allows a scene to be mapped in 3D giving an accurate representation of the objects present. The technology is used in Accurance 3D, OPTEX s tailgating detection system for interlocks. Potential applications include object protection. Laser scan detector REDSCAN RLS-2020 will also be on the stand. The technology protects assets and detects people jumping over turnstiles or climbing through skylights as well as detects thrown objects being smuggled into restricted areas. For commercial and residential security, OPTEX will exhibit its new wireless infrared beam, the SL-TNR.

The last zone will include demonstrations of how OPTEX s wireless outdoor sensors can be used in IoT applications, by sending alarms and other data via the cloud to a smartphone, for instance. Jacques Vaarre, managing director of OPTEX, EMEA, says that live demos are the best way to show the range of applications that can be achieved with the firm s sensors. Check out OPTEX s latest products at IFSEC International, 20-22 June 2017, London ExCeL. You can find them on stand E600. Get your free badge now. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

CEDIA advises on smart wiring

Due to today s ever growing reliance on digital and smart appliances, security professionals are facing greater pressure to install complex cabling infrastructures needed to support smart home technology. Simon Buddle, Education Director at CEDIA EMEA, highlights the importance of installing an efficient and secure residential cabling system. He explains how professionals can provide clients with the right cabling requirements for the modern home of today and tomorrow.

Wiring in the evolving smart home Technology is increasingly infiltrating the home. With virtually all household technologies part of the home network, a simple phone line and TV antenna is no longer adequate to support the technology that is now available to homeowners. As a result, many require comprehensive wiring infrastructures and data network systems that are suitable for the modern smart home. In order to prevent opportunists from doing it themselves , it s crucial for security professionals to offer a a service that benefits homeowners. A correctly wired infrastructure at the very first stage of building or renovating is fundamental to homeowners who want technology. A common phrase heard among the home technology industry is the most expensive cable you have to install is the one that did not get installed in the first place . The basis of a smart home is the infrastructure, the cables. Not all properties require technology at this stage. But it is crucial for the correct wiring to be in place so that it is ready for the future.

A wired infrastructure can set up the home for future applications, whilst still preserving the d cor of the home and adding value. The rise of smart wiring presents a great opportunity for security professionals. The home technology sector presents a lucrative opportunity for these professionals to expand their reach and create new business. By offering a more complete service for the home, including specialist services, such as fitting reliable cabling infrastructure, security professionals can guarantee their businesses will be more resilient. It could help them through tough times as they pick up more work from new and existing customers. CEDIA s smart wiring education To make sure security professionals are up-to-date with the latest skills and knowledge, CEDIA has best practice advice for wiring smart homes. CEDIA has a number of courses for those who want to extend their cabling knowledge. One of their most popular education programmes is its one day Smart Home Wiring course. Attendees learn how to plan and install a wireless infrastructure that can withstand and integrate a range of modern technological demands.

Based on the Smart Home Infrastructure Recommended Guidelines , it promises to leave attendees with a clear understanding of how a modern home should be cabled for new technologies, and future flexibility. CEDIA s the Smart Home Infrastructure Recommended Guidelines is perfect for security professionals looking to move into the home technology market or gain a wider understanding of the subject. The document aims to help security professionals understand the comprehensive cabling infrastructure required for the modern home. It sets out a plan for a far more integrated and modern approach to wiring homes. CEDIA at IFSEC CEDIA is hosting a number of training sessions at IFSEC International 2017. The 90 minute training sessions will take place in South Gallery Suite 8 at ExCeL on 20 th and 21 st of June: 20th June: Introduction To Smart Home Technology IP Networking for the Smarthome WiFi Tips & Tricks For The Modern Home Intro to Audio, Video & Home Entertainment 21st June: Introduction To Smart Home Technology Building A Business In The Smart Home Marketplace Panel Discussion Lighting Control For The Secure Home Wiring Infrastructure For The Modern Home For more information on what advice, courses and literature CEDIA can offer security professionals, please visit Be smart come to IFSEC International 2017 The Internet of Things (IoT) is becoming an ever important element of various technology solutions for the smart home. The ability to connect, communicate with, and remotely manage a vast number of networked, automated devices via the internet is now inescapable.

This June, the latest smart products are on hand to test and trial throughout the exhibition as well as a dedicated smart seminar theatre, and training sessions on the show floor.

To avoid missing out register here


Lessons for Public Health …


1 GAO United States General Accounting Office Report to Congressional Requesters September 2000 WEST NILE VIRUS OUTBREAK Lessons for Public Health Preparedness GAO/HEHS

Video surveillance for todays seniors

The lifespan of the average man and woman has increased over the years, due to advances in medicine and improved nutritional standards. Seniors who would have been considered elderly only decades ago, are now still vibrant and living independently. Even senior citizens who live at home with the assistance of a nurse or in home care aid, can live life to the fullest.

Of course, this doesn t mean that family and friends don t worry about them. On the contrary, people in their 80s and 90s and those individuals lucky enough to live past the 100 mark may need guidance. Any lack of balance or simple fall can cause a hospital stay, with a broken hip likely to create further medical issues. Forgetfulness and hearing loss makes otherwise diligent seniors forget to take their medicine or hear the ring of a doorbell. Seniors and technology Teens and young adults have no problem living their lives in front of the camera. Their generation enjoys being videotaped whenever and wherever they may be. However, this is generally not the case for senior citizens. Many older people still fear technology and feel uncomfortable with video equipment in their homes, no matter how unobtrusive these cameras may be. Young adults try to explain to their parents how crucial a camera may be to their senior loved ones health, security and well-being.

It s always important to discuss the subject thoroughly, before making any purchases. Surveillance monitoring equipment is not only a definite investment, but at no time do you want a parent or grandparent to think that they are being spied on unnecessarily. Less invasive forms of video monitoring You never want to make anyone uncomfortable in their own home. This is especially true of those people who believe that someone will be watching them in various stages of undress or when using the bathroom. Luckily there are monitors which function as sensors, simply alerting a loved one that something is amiss in the household. Monitoring systems do use traditional video cameras, so no footage is obtained from the home. These wireless and diminutive sensors are placed where they can detect motion or a change in normal patterns of activity. When this occurs, a contact is immediately notified. You can choose how messages are sent confidentially via telephone, email, text message and mobile app.

Wireless motion sensors An excellent example of how these sensors are employed, concerns their usage in determining if someone has taken their daily medicine or meals. Sensors are small enough to attach to regular household items like pillboxes and television remotes. You can additionally attach sensors to the refrigerator or interior door, alerting a loved one that their senior is home and on schedule. Let s say that a senior has opened a front or back door at an unusual hour of the night. Their family member or guardian would be alerted at once. This information is particularly urgent when seniors are completely alone or live with a spouse yet suffer from dementia. Once alerted, a loved one can contact the police, a neighbor or rush over on their own if possible. Home surveillance videos Video technology is routinely used to monitor homes, schools, shopping centers and commercial buildings. More than one person has discovered that their pet was running amuck through their house or that an employee has been stealing from their place of business.

In severe situations, acts of child abuse and crimes committed in bright daylight have been uncovered. Today s video cameras are stylishly small and easily set up around the home. All that s required is an on-site wi-fi system so images can be sent directly through the Internet. The capability of your chosen video equipment will vary greatly, depending upon its cost and complexity. However, newer home based surveillance systems will operate with amazing accuracy. Real-time video monitoring saves lives Instead of spying on seniors, loved ones are now able to see and hear if an emergency is happening in real-time. Night vision cameras allow for surveillance during the night and early morning hours when illnesses often take lives. Sound detection features let loved ones hear if a senior is calling out for help or someone else is prowling the premises. More complicated video surveillance systems come with a variety of other options.

These include motion based sensors and audio components that give viewers a chance to speak directly to the subject under surveillance. You can additionally record videos and save them to the Cloud, so they can be reviewed more intensely later. Peace of mind and security Using simple mounts with adjustable angles, monitoring equipment literally blends in with any d cor. Seniors can go about their lives in their own home, with the knowledge that a medical emergency or act of crime will be reported as it plays out. Should a senior citizen not remember exactly what happened, the video feed can replay to catch the incident in its entirety. For those seniors who require a caregiver or housekeeper, video surveillance cameras provide an ongoing record of their employment. Should an act of abuse or theft take place, it is likely to be captured in full view of the cameras. This aids families and the authorities. Just as Nanny Cams have revolutionized child care, home video surveillance can transform how seniors live.

While some people might find the presence of a video camera intrusive, the eye of the camera is really their friend. Better yet, family members can now monitor these video feeds right from their mobile devices giving them a chance to advocate on behalf of their loved ones. Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Furthermore, take advantage of discounts up to 30% available exclusively at the show.

Ensure you aren t the one left out register now

Kitemark standard would be a progressive step towards strengthening IoT security

Symantec internet Security threat Report The recent Internet Security Threats Report from Symantec highlights that last year cyber attackers have been fishing for gold in all areas and frequently finding success, as seen by the sheer regularity of breach reports in 2016. While malicious emails and ransomware continued to wreak havoc on businesses and consumers alike, the study again highlighted new threats coming into the spotlight thanks to the increase in usage of connected devices. In an era where data is becoming the new currency, all personal and professional data needs to be properly protected especially with GDPR regulations fast approaching.

As more businesses take advantage of the benefits the internet of things (IoT) can bring to their business, they also need to utilise technologies available to them such as machine learning to help analyse and help detect and improve weaknesses in a network and spot abnormal activity when it occurs. We can expect various forms of attacks to continue to increase. There is no excuse not to be prepared. As we continue to see the exponential growth of connected devices, we will continue to see security issues that we hadn t even considered before, such as the Mirai botnet of 2016. Lessons will clearly be learned such as avoiding hard coding IP addresses, use of default password, while many of the protocols designed for smart connected devices will have their own potential flaws and vulnerabilities which organisations will have to tackle. Online Trust Alliance (OTA) To help make securing internet-connected devices easier for businesses, the Online Trust Alliance (OTA) has produced a framework in IoT security, offering guidance on how to secure embedded devices. This introduction of a kitemark standard for IoT devices is a progressive step towards ensuring safe practice is followed and that security of such devices against these types of hacks is stopped at source. In short, we can expect various forms of attacks to continue to increase. With this knowledge there is no excuse not to be prepared.

Cybercriminals are entrepreneurial, well-sourced and motivated and Symantec s report once again demonstrates that the threat of attack is a growing problem. Organisations and consumers need to be wary of attacks, as the damage could be far greater than just financial and reputational. Organisations must now realise that they can no longer afford for cybersecurity not to be their number one priority. Ensure a solid security strategy at Borders & Infrastructure Expo Join other high-end security professionals at the launch of Borders & Infrastructure Expo, in conjunction with Europe s most renowned security event, IFSEC International, addressing your critical needs for large-scale security projects. By attending, you ll access leading security providers showcasing the latest advancements in both physical and cyber solutions.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Internet of things bubble will burst in 2017, predicts Wired Magazine

Internet Of Things Bubble Will Burst In 2017, Predicts Wired Magazine

IoT trends Wired magazine has prophesied the demise of the internet of things (IoT) in 2017. As predictions go it s pretty bold given sales of internet-connected devices already number 12 billion worldwide and are projected to grow to about 30 billion by 2020. On the face of it, the tech bible has really stuck its neck out on this one.

Except Wired hasn t actually forecast the demise of internet-connected devices per se ; rather, it s the IoT term itself it believes is on borrowed time, along with an assumption associated with it: that no object, however mundane, cannot be improved with a computer chip. The Internet of Things was a made-up term to begin with, says the article in question. And now this bit of marketing nonsense carries a sheen of ineptitude, danger, and other shit. The upshot: the term will die in 2017, kinda like Big Data before it. Visitors to CES 2017 in Las Vegas test out some VR headsets The success of a Twitter account called the Internet of Shit, which tweets disparagingly about the myriad IoT devices being launched to more than 100,000 followers, augurs ill for the IoT, says Wired. To test out just how widely the IoT concept was being applied to everyday things , I drew up a list of the most mundane objects I could think of and Googled them with the prefix smart . Of the seven I Googled, four had already been enhanced with a computer chip and Wi-Fi connection (in the IoT camp: toilet roll holder, duvet cover, cushion and mirror; still stuck in the analogue age are sofas, breadbins and shoehorns). Yeah baby shove my smartphone in a 20lb bottle of water with a speaker or whatever #CES2017 Internet of Shit (@internetofshit) January 7, 2017 The other problem and one exacerbated by the sheer volume and range of IoT products is the cyber threat. If the media has played its part in hyping up the IoT, then it will also play a key role in facilitating its decline thanks to the slew of stories about the security risks posed by connecting your home.

Long focusing their fire on corporations albeit it s consumer data that is usually stolen tech writers and security experts are now warning of a frightening new spectre: that criminals will turn their attention to smart homes that lack the enterprise-grade security enjoyed by Fortune 500 companies (which is still shown to be lacking in so many cases). Wired noted that in September, nearly 1.5 million IoT devices (mostly surveillance cameras) were hijacked and that the following month, the same piece of malware rendered large swaths of the internet inaccessible to many people. The IoT has also been damaged by bricked devices, irritating outages, bankrupt startups, an international emissions testing scandal, and a viral story about a Brit who spent 11 hours trying make tea with a needlessly high-tech kettle. Aware of this perception the IoT industry has been scrambling to remedy vulnerabilities such as the widespread use of default usernames and passwords that hackers can easily find by trawling Google. At CES 2017 Symantec Norton unveiled what it claims is the most secure router in the world and is certainly one of the most aesthetically interesting. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. Symantec Norton s Core Router Securifi, meanwhile, launched a mobile app that highlights vulnerabilities like easy to guess passwords or open ports and shows users how to remedy them. The next-generation of Bitdefender BOX was launched in Las Vegas too. Bitdefender s IoT security hardware protects against malware, hackers, ransomware, phishing and other online threats with data anonymization, malware scanning, machine-learning algorithms and network intrusion prevention technology.

Clearly, the IoT has been on the well-worn path followed by so many tech crazes. First, there s a lot of hype, but also considerable teething troubles where products malfunction or work less effectively than promised. Developers don t yet know what customers want from the tech, so there s a lot of trial and error and dud technology (that people later mock with the benefit of hindsight). Eventually, issues around usability and compatibility and cyber security will be remedied to a large degree and a clearer picture will emerge of what the IoT or whatever it is called by that time is for and what kinds of things can really benefit from internet connectivity. As Wired writes: The Internet of Things or whatever you want to call it has the potential to save precious resources, spot and fight pollution, and help people lead healthier, safer lives. But adding internet remote control to every single product on the market won t necessarily help us get there. What we need are thoughtful, affordable, durable devices that actually, y know, make our lives better. A new name, and a renewed sense of purpose, could be just what the Internet of Things needs. Click here to read the original feature in Wired, which also makes another four tech predictions for 2017.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

5 fire-safety innovations showcased at CES 2017

5 Fire-safety Innovations Showcased At CES 2017

A hearing aid that connects to smoke alarms via Wi-Fi (image above) and a smart oven that turns itself off to cut fire risk were among the innovations on show at the world s biggest consumer electronics event.

1. HomeKit-enabled smoke alarm can turn on lights as well as audio signal The HomeKit-compatible smart smoke alarm from Netatmo activates an 85-decibel chime when it detects smoke. Real-time smoke alert notifications are sent to paired smartphones, whether the homeowner is at home or not.

Unveiled at CES 2017 the alarm s most intriguing feature is the configuration of scenarios made possible by compatibility with HomeKit the software interface that links iPhones with smart-home appliances. Users could, for example, configure their phone to switch on all smart lights in the house as well as triggering an audio alarm. Otherwise, the alarm s features mirror those seen on competitor products from Nest, Halo and First Alert. An alert is sent when the battery is approaching the end of its lifetime but given this is supposedly a full 10 years there s a strong chance you ll have replaced the device with a more sophisticated model by then. The alarm performs regular battery and performance tests, generating self-check reports on the user s app. Netatmo s alarm is also sophisticated enough to distinguish between smoke from a fire and smoke from burnt toast or another false trigger. Using the Netatmo Security app users can silence the alarm with the Bluetooth LE hush feature and check its status on an integrated LED strip positioned on the front of the alarm. Another Netatmo product was credited with preventing tragedy following a house fire and it wasn t a smoke alarm.

2. Hearing aids that connect to IoT smoke alarms Oticon showcased a remarkable new hearing aid in Las Vegas.

Launched in June 2016 Opn (see image at top of page) is the world s first smart hearing aid that connects directly to internet of things (IoT) devices, including smart smoke alarms. The hearing aids, which could also link to things like smart doorbells or TVs, can receive signals direct from alarms and turn down competing background sounds so the alarm is unmistakable and unignorable. Oticon s Opn connects to the web via IFTTT, which in theory makes it compatible with any IoT device. Opn, which can be customised to the person s skin tone or tastes, is particularly invaluable in noisy environments, given that hearing loss often makes it difficult to separate individual sounds and their sources from a cacophony of noise. The smart hearing aids use machine learning to recognise voices through frequency ranges and patterns and turn the volume down on other background sounds. The specific sound profile can be acutely tailored to only address the areas of hearing loss they suffer from. Oticon Opn triumphed in the 2017 CES Innovations Awards in two categories: Tech for a Better World and Wearable Technologies. A Velox sound processor powers Oticon s proprietary BrainHearing technology. embedded content 3.

Oven that prevents fires and false alarms from GE Appliances GE Appliances collaborated with Nest Protect so that the latter s smart smoke alarms can be integrated with the former s ovens. The detector, which also detects carbon monoxide, sounds an alarm and sends notifications to the user s smartphone when the oven has been deactivated. Cooking should be an enjoyable experience, but we know that sometimes there are mishaps in the kitchen, said Paul Surowiec, vice president for cooking products at GE Appliances. Our integration with Nest Protect helps us ensure that our connected oven owners are safer when cooking, especially when the oven is left unattended. Nest Protect features a split-spectrum sensor that uses two wavelengths of light to distinguish between fast- and slow-burning fires. Residents can remotely silence an alarm using the app silence function, even when not at home. From their smartphone they can also conduct safety checkups on sensors, Wi-Fi connection, horn and speaker. Find out more about this innovation.

4. Airthings Wave detects deadly radon gas Airthings Wave alerts householders to the presence of a gas which is believed to be the leading cause of lung cancer among non-smokers.

Tens of thousands of deaths globally are attributed to radon, including 21,000 Americans more than six times the number of deaths attributed annually to house fires and carbon monoxide poisoning combined. Until now tests for radon usually involve charcoal canisters, which take a snapshot of radon levels and only provide results after samples have been sent for analysis in a lab. The constant, real-time monitoring offered by Airthings Wave represents a meaningful advance given that radon levels fluctuate depending on climate, ventilation levels and time of year, among other factors. The rise of the internet of things (IoT) has emboldened Airthings to believe that radon monitoring could and should become as affordable and commonplace as smoke detection. Find out more about this innovation.

5. Norton Cure IOT router OK, so we re cheating a bit here: it s not a fire safety innovation as such. But bear with us. Anything connected to the internet can conceivably be hacked and that includes smart smoke alarms. Therefore safeguarding your Wi-Fi network and attached devices against the nefarious intrusions of cybercriminals is wise.

Of course, you could draw the conclusion that the cyber risk which you can never 100% eliminate means that you ll stick to your analogue smoke alarm thank you very much. If you do want to go smart, then you may be interested in Symantec Norton s new product, which it claims is the most secure router in the world. If that s the most relevant insight about the product if the claim stands up to scrutiny then the most fascinating one to non-technophiles at any rate is surely its appearance. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. One might presume that the shape is purely aesthetic. Not so, according to Symantec Norton. The antenna is apparently inspired by defense and weather radars for better wireless coverage. The Core will inspect every packet of data for known malware and will automatically quarantine any device running firmware known to be a security risk. It s powerful too, boasting a 1.7GHz dual-core chip processor and 802.11ac Wi-Fi broadcasting on both 5GHz and 2.4GHz bands, with a maximum throughput of 2,500Mbps.

Free download covering legal requirements for responsible persons under the FSO, courtesy of the IOSH, BIFM and USHA approved UK provider of health, safety and environmental information.

Key features: A full breakdown of the Regulatory Reform (Fire Safety) Order 2005 The key actions when dealing with fire precautions & protection A complete guide to maintaining procedures and requirements within your organisation.

Download now

CES 2017: The top 5 trends in security tech

CES 2017: The Top 5 Trends In Security Tech

As CES 2017 closes its doors for another year, let s take a look at some of the trends apparent on the show floor this time around.

1. Is the IoT industry finally taking cyber vulnerabilities seriously? The sharks have smelled the blood in the water and they re now circling to use your IoT device for further attacks, James Lyne, global head of security research for Sophos, told CNBC.

Chances are right now if you re buying an Internet of Things device, you re more likely to be buying something insecure, than secure, continued Lyne, who has demonstrated on YouTube how to hack a security camera. Ominous words indeed. With the number of IoT devices projected to grow from 12 billion to about 30 billion by 2020, the vectors of cyber attack are multiplying faster than cyber security professionals (of whom there are all too few) can keep up with. Security is little more than an afterthought on too many devices, with criminals able to guess default usernames and passwords by trawling Google. If this year s CES was anything to go by, the industry may belatedly be waking up to the threat. The consequences of a hacked autonomous car are particularly terrifying. Enter Bosch, which has launched a mixture of keyless entry and digital key sharing. Perfectly Keyless, whereby the owner opens or locks the car doors with their smartphone, purports to removes needless complexity that could be exploited by hackers and coordinate transmission and receipt of data through a central gateway on its own servers. As for the smart home, Symantec Norton unveiled what it claims is the most secure router in the world.

If that s the most relevant insight about the product if the claim stands up to scrutiny then the most fascinating one to non-technophiles at any rate is surely its appearance. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. Core will inspect every packet of data for known malware and will automatically quarantine any device running firmware known to be a security risk. Securifi, meanwhile, launched a mobile app that works with the new Almond 3 router that shows what IoT devices are on a home network and highlights vulnerabilities like easy to guess passwords or open ports. The app will take users through the steps to fix security weaknesses. The next-generation of Bitdefender BOX was unveiled. Bitdefender s IoT security hardware protects against malware, hackers, ransomware, phishing and other online threats with data anonymization, malware scanning, machine-learning algorithms and network intrusion prevention technology. Fortress Cyber Security launched Fortress UTM, a residential unified threat management (UTM) appliance. Securing both computers and internet of things (IoT) systems, it s the first solution of its type, providing intrusion detection and prevention, firewall and anti-virus for all Wi-Fi and IoT/Ethernet attached systems, seeks to combat the growing threat of data theft, ransomware, distributed denial of service (DDoS) attacks and the commandeering of corporate IT resource to distribute stolen content or host and distribute sexually explicit material.

2. Developers will literally put a chip in anything When microwave ovens became popular in the 1980s many people got so excited they cooked literally anything and everything in them from bacon to whole chickens (no doubt many people still do) and were egged on by ostensibly authoritative cookbooks dedicated to the art of microwave cooking. The still fairly novel concept of connecting everyday objects to the internet has set loose a comparable mania for applying the IoT concept as widely as possible.

From homeware to clothing and personal accessories, no thing is too humdrum that someone hasn t already put a computer chip in it or eventually will. For every transformative invention there are countless downright daft ones it s very much about throwing the proverbial mud against the proverbial wall at this juncture. Twenty years from now we ll look back and marvel at a handful of technologies that had a profound impact on reducing drudgery and enhancing our leisure times. And then we ll consider the smart hairbrush (something the satirical account @theinternetofshit has already railed against). Or the smart suitcase cover. It will be fascinating to see which ones sink without a trace (later to re-emerge on what were they thinking? type TV programmes), which ones sell well and which ones have a meaningful impact on society. And it probably isn t as obvious which ones fall into which category as you might think.

3. Cameras are king just as in the commercial security world Walk around any major security trade show and CCTV cameras still dominate.

The emergence of video analytics and ever higher resolutions have sustained interest in cameras long after countries like the UK reached saturation point with network camera coverage. Now surveillance cameras have been repackaged for the consumer market they re eclipsing other security technologies in terms of media coverage and number of products launched there too. Trawl Google, Twitter and other platforms for CES 2017 related security tech and cameras and you ll see what I mean.

4. Camera-light combos If cameras are king then one type of camera in particular has been particularly apparent this year: the surveillance camera-cum-lamp or floodlight. Light bulb maker Bell & Wyson is unveil;ed a light bulb with a concealed camera embedded at CES 2017. The low energy (11W) LED bulb-cum-camera has a TF slot and two-way microphone and will stream footage to tablets and smartphones via Wi-Fi. Ring also launched an outdoor floodlight camera. A motion-activated security camera the Floodlight Cam features built-in 3K lumen LED floodlights, a 270-degree field-of-view, facial recognition, a 110-decibel siren alarm, two-way audio and infrared night vision. The camera, which is hardwired and can be installed without professional help, is controlled via Wi-Fi via an iPhone or Android-based smartphone. The camera also incorporates a siren, which the householder can turn on to deter suspicious persons. Users can also yell out would-be intruders through the Floodlight Cam s loudspeaker.

The camera is weatherproof and can cope with temperatures between -5 F (-20 C) and 120 F (48 C).

5. DIY install For installers home automation meant installing high spec systems for very affluent customers or technophiles who could stretch to the high cost. The falling cost of the technology means this is changing, but just as a new opportunity presents itself, another threat becomes apparent. Most kit can be installed by the user and doing so is only becoming easier. So why shell out for professional installers or pay monthly fees for round the clock monitoring? Thankfully, as far as installers are concerned, mostcustomers still prefer a professional service to one they set up and monitor by themselves, surveys have indicated. Among the reasons this is still the case is lower insurance rates.

To stay relevant installers should allow homeowners more freedom to customize systems with the devices and services they really want, else they lose more customers to the DIY market, according to Bryn Huntpalmer.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.