Physical security is a crucial aspect of cyber security as it deals with the protection of the tangible components of a computer system. Given that it involves safeguarding the actual physical parts of a computer system, physical security is an essential component of cyber security. The elements of physical security include protecting workstations, servers, storage systems, and other pieces of gear. To guarantee the privacy, accuracy, and availability of the data stored and processed on these systems, these assets must be physically protected.
Viakoo has been awarded a patent for their innovative method of remotely updating and managing a multitude of IP connected devices regardless of whether they reside on isolated networks, local networks, or wide area networks. Unmanaged and IoT devices increase the risk of cyber vulnerabilities and other operational challenges when they are using outdated firmware or lack certificate management.
Johnson Controls has further expanded its Tyco Illustra range with the launch of a new Flex multi-directional camera. Designed to provide a highly cost-effective solution for monitoring activity over wide-open spaces, the second generation Illustra Flex multi-directional camera is equipped with four separate image sensors which can be individually positioned and angled to provide up to 360-degree coverage via four separate non-stitched video streams.
Teleste Corporation and a leading international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems.
In a recent series of videos on his YouTube channel aiming to popularize cyber-security, Micode looked into one of the most lucrative scams of the internet. The investigation brought him on the other side of the world in Mauritus for 3 episodes, of which the first have almost reached 1 million views. The 3 episodes have recently been subtitled in English for an international audience to understand how this very popular scam works.
Lots of homeowners are investing in modern technologies like smart assistants, smart speakers, and internet-connected security cameras. And while all this technology makes life easier at home, it also raises concerns as more people worry about things like getting hacked, being spied on, and having their identity stolen. ASecureLife.com surveyed hundreds of Americans across the country to get a sense for how much people trust the new-age technology filling their homes
IIoT infrastructure has encountered increasing cyber security threats due to the vulnerability by the use of public networks for IT/OT convergence. This has exposed exploitable opportunities for hackers. To add confidence in industrial control system (ICS), Lanner presents LEC-6041, the next-generation industrial cyber security gateway. Lanner’s LEC-6041, being the successor of LEC-6021, is designed to protect the communication in both IT and OT domains. LEC-6041 Series is empowered by Intel Atom x7-E3950 or x5-E3930 for low power consumption and high processing performance.
With recent breaches of healthcare databases, healthcare providers need to determine whether storing protected health information (PHI or ePHI) in the cloud is a good idea. Cyber security expert Spohn Consulting points out that this decision should be made with care. Many healthcare providers must decide whether they should store protected health information (PHI) in the cloud. There are benefits and concerns to storing PHI in the cloud, and the decision to do so should be based on carefully analyzed data.
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organizations can protect themselves through cost-efficient and intelligent solutions.