classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


A shared responsibility
November 2018, Cyber Security, CCTV, Surveillance & Remote Monitoring

Nothing man-made is ever 100% secure. Intentional backdoors are bad design and show a significant lack of understanding around the basics of a cybersecure world. In addition, programming mistakes can not be avoided completely.

Cybersecurity is a shared responsibility, none of the stakeholders in the market can fight cybercrime alone, we all need to work together to get ahead in the cyber game. Let’s take a look at the different responsibilities of the different stakeholders.

The user

The main responsibility of the user is to pay for cybersecurity measurements. This can either be done in a ‘DIY’ way, meaning the IT department applies fixes themselves, or to pay an integrator/installer to look after maintenance. A system’s lifespan is easily 10-15 years. Assuming that nothing needs to be done to keep the system in good shape is very short sighted.

The integrator/installer

This stakeholder plays an essential role in the cyber game. The integrator/installer needs to ensure that all his/her own devices, laptops, mobile devices etc. are patched with the latest updates for the OS and run a sophisticated virus scanner. Selected passwords should be complex enough and individual at least per customer and site. The general habit to use one master password to make the service of the devices easier has to be avoided.

Remote access to installations should be limited and all devices being connected to the customer’s system should be checked very carefully for viruses to avoid any kind of infection.

Without maintenance the cybersecurity will very likely decrease over time. The probability is almost 100% that a vulnerability will be found in the system’s context, meaning the OS, the software or the hardware.

The consultant

Another essential component is the work of the consultants, the ones specifying the components for security systems. They need to not only specify the right product features and properties, they also have the responsibility of specifying ongoing maintenance.

The distributor

For a pure distributor, the topic of cybersecurity is very simple. They are just handling the logistics and do not touch the product itself. However, value-add distributors need to consider the same aspects as integrators or installers do.

First and foremost, transparency is key: They need to let their customers know what they are buying. Without this transparency it is typically the price which influences the customer’s buying decision the most. They also need to guarantee to supply firmware upgrades in case of vulnerabilities from their original supplier. The habits of the industry show that a detected vulnerability in the original suppliers’ devices is typically, not fixed in the devices of their many OEM partners.

The manufacturer

Manufacturers’ responsibilities are relatively simple to understand:

• Do not include any intentional aspects, like backdoors, hard coded passwords etc.

• Supply the right tools to make cyber management for many devices as simple and affordable as possible.

• Record relevant aspects in hardening guides or other documentation.

• Enable the use of standard mechanisms make devices as secure as possible.

• Inform the partners and channel about vulnerabilities and available patches.

The consumer

Our own behaviour is also a key aspect to a cyber mature mindset. How often do we change the router’s password? How complex are our own passwords? Do we use different passwords or one master password for most of the applications? Lazy user behaviour is still one of the biggest benefits for hackers. Simple to guess passwords and ones that are used across all logins put consumers at risk of having their accounts hijacked.

One stakeholder alone cannot accomplish the mission to make and keep a system cyber secure. Only by having all stakeholders take responsibility for keeping data safe will we be successful in fighting cybercrime.

For more information contact Axis Communications, +27 11 548 6780, sasha.bonheim@axis.com, www.axis.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.
  • Video-based parking management
    November 2018, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Using surveillance video for vehicle counting improves parking management at an attractive cost and limited installation hassles.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • Integrated security and event management
    November 2018, Johnson Controls, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    High-end central London multi-zone development chooses Tyco Security Products’ C•CURE 9000 Security and Event Management system.
  • Hospital adopts integrated solution
    November 2018, Bosch Building Technologies, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Fire & Safety, Integrated Solutions, Healthcare (Industry)
    Adana sets the standard for patient safety in a system marked by low overall cost of ownership, maintenance costs, and failure rate.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
  • Optimal selection of CCTV operators
    November 2018, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Technology is often seen as the primary factor in the success of CCTV surveillance control rooms, yet Dr Craig Donald has seen new control rooms with the most up-to-date technology fail.
  • Our dependence on cyber-connectivity
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
    The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.