Service provider got you hacked?

April 2016 Cyber Security

Not a day goes by, it seems, that we are not hearing about some sort of security breach involving a major retail operation or corporation. Hackers seem determined on getting at protected data, such as credit card information or identity numbers, by any means possible.

For the security industry, every such attack brings new concerns about the safety of network-based systems. The network is the back door to accessing all kinds of information, whether it is financial, personal or something specific to the security of an operation.

For instance, a cyber criminal may be looking to interfere with a security system by interrupting the video stream, altering camera views so someone can make a physical attack on a location or hijacking the servers to perform illegal functions. Even a camera, if left vulnerable, may be used as an entry point to a larger network.

As a result, it is increasingly important to know what steps a security system provider is taking to ensure that its network-based equipment such as NVRs and video management systems are hardened against attacks.

While the US Federal Information Security Act mandates a specific level of compliance, it is critical to work with a supplier that understands what is involved in the compliance process, and is invested in taking a lead on this critical issue.

Here are some of the most important questions to ask a security system supplier:

• How often are updates provided for the product and how are security vulnerabilities handled? More frequent updates to the product means more opportunity to remove vulnerabilities. Also, by monitoring new vulnerabilities found through international databases a supplier can release a patch quickly to address a critical vulnerability.

• Is the company undergoing third-party assessments of its products? Having an independent, third-party undertake penetration testing will point out what vulnerabilities exist and allow the company to take the proper action.

• How often does the vulnerability testing take place? Each time the software within a product or system is altered, there should be a new test so the development team can address any new software issues before the product is released.

• Has the company documented what it is doing? Knowing what the vulnerabilities are and how they have addressed them can go a long way toward ensuring your comfort level with a product.

As cyber criminals continue to develop new methods for gaining access to information and systems, data safeguards become more and more vital. How a supplier is safeguarding its products and your data serves as a critical first line of defence against cyber attack.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Industrial control systems under attack
News Cyber Security
According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.

Read more...
OSINT: A new dimension in cybersecurity
Cyber Security
The ancient Chinese strategist Sun Tzu noted, you should always try to know what the enemy knows and know more than the enemy.

Read more...
Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...
Building a holistic application security process
Altron Arrow Cyber Security
Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.

Read more...
Managing data privacy concerns when moving to the cloud
Cyber Security
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Read more...
Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Read more...
The democratisation of threats
Cyber Security
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Read more...
Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Read more...
Exploiting Android accessibility services
Cyber Security
Pradeo Security recently neutralised an application using Android accessibility services that exploits the permission to perform fraudulent banking transactions.

Read more...
Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...