1 March 2022

GARDiS

TDSi launches new GARDiS software features

The new features are the latest in the GARDiS software’s continual evolution which is designed to pre-empt the needs and demands of installers and security end users. Tina Baker, Software Project Manager at TDSi commented, “This latest update is designed to make installing and using integrated systems even easier with GARDiS. With GARDiS as the central hub for security operations, end users are empowered to integrate their own choices of hardware, to generate detailed reports and gain detailed insights from their security data.” Universal decode/auto detect To ensure integrating security systems with the GARDiS software is even easier, v2.3 now includes a powerful universal decode and auto detect function, to assist faster and more straightforward installation of new or legacy systems as part of the security network. Support for RS485 readers The latest version of GARDiS adds support for popular RS485 readers, providing a broader range of choice for the integration of hardware. Generation of FILO (First In Last Out) reports The TDSi GARDiS software now offers the generation of First In Last Out reports to provide detailed information on the movement of authorised persons within the security zones of any monitored sites. GARDiS v2.3 generates a report that shows the first and last activity that day for each user, group of users, or all users on the system. Extended door lockdown For added flexibility during uncertain times, GARDiS v2.3 now supports an extended door lockdown function which enables the security operator to specify required high security access groups to continue gaining access through doors during a site lockdown. Data Fusion and Exporter To enable ever closer integration with other security systems, GARDiS v2.3 includes a new data fusion and exporter functionality which enables information to be easily but securely shared to and from the platform, to suit the broader requirements of the security operator and the network. Access Control Units (ACU) inconsistency To ensure the security operator is immediately aware of any potential issues with ACUs on the network, GARDiS v2.3 now provides an inconsistency alert to ensure this is flagged up for further direct investigation. Automated Report Emailing Enhancements within the Cause-and-Effect feature allow automated reports to be emailed to required personnel. Bespoke badge design and printing To support the rapid generation of new authentication badges, and to support corporate branding for easy visual recognition of authorised ID, GARDiS v2.3 enables the security operator to use personal image capture, photo ID badge design and print to aid visual verification. Gamanet C4 Integration GARDiS now features a third-party integration with Gamanet’s C4 Integration Security System. Gpoll 1.0.8 support GARDiS v2.3 supports Gpoll 1.0.8, with up to 150 IP channels on a single instance. Reset of password via email feature For the simple but secure reset of passwords. Tina concluded, “The latest raft of enhancements to GARDiS are again generated from close consultation with our installation partners and customers. Our development team firmly understands that new features must help to refine and improve real-world security operations, rather than being introduced simply because the technology is available. These new value-add features help to improve and refine secure access control operations and the user experience, benefitting both our customers and installation partners.” The new features are available to download and install now through v2.3 of the GARDiS software. To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

TDSi launches new GARDiS software features Read More »

cybersecurity

The state of cybersecurity in 2022

Michael Aminzade, VP of Consulting Advisory Services at Viking Cloud, discusses the state of cybersecurity in 2022 Cybercrime has been on the rise, with the first half of 2021 seeing a 93% increase from the same time in 2020. As a result, the state of cybersecurity has had to shift dramatically. This has made it a difficult subject to follow for many organisations. As businesses focus on the changing approaches to work and new expectations from customers, risks created by cybercrime are being treated as a low priority. Part of the problem is a lack of basic understanding around the state of cybersecurity at large. This isn’t because of negligence, rather the landscape is shifting so much that it’s hard to keep track of. So, in this article, I will highlight three of the most significant changes to the state of cybersecurity in 2022. This way, it will be easier for an organisation’s cybersecurity team to know where to focus first on the ongoing battle against cybercrime. Working From Home The last two years have been tarnished by the COVID-19 pandemic. To survive these turbulent times, organisations had to adapt – and not just to changes in cyberattacks. The pivot to working from home for many businesses came with concerns, but the proof has been in the pudding for many businesses who have prevailed in spite of COVID, highlighting it is possible for employees to work from home and still deliver. Whether a company allows working from home to continue long term will influence the digital security of the network. The obvious issue with working from home is it introduces several more entryways into a network. Even if employees have company mandated laptops and phones updated to have the best digital security programmes covering them, the home network an employee would use would naturally have their own devices connected. Smart TVs, personal smart devices and even home computers won’t be protected by a business’s vulnerability management solution, making it a potential route for hackers to get onto a network. While this might mean the better option would be to force employees to work back at the office to reduce security risks, this can have different consequences and produces other forms of security risk. An employee might prefer working from home, and being forced to come back into the office could lead to several social engineering issues. A lack of motivation to work leads to a lack of tact and care, which hackers can exploit. In the most extreme cases, it may even lead to an employee becoming an insider threat. There are still a lot of challenges in this space that need tackling, and we will see that throughout 2022. Training employees about the risks working from home brings to both the business and their own personal data is a good start. Another tactic is to limit the number of third parties that come into contact with your data who lack any contractual obligation to keep it safe. There are multiple ways to achieve this; encryption, controlled access, virtual desktops data are just a few examples. A less immediate action that can be taken by an organisation (but one that will surely help) is a shift in focus to how data is handled. Rather than focusing on what is trying to enter the network (especially with networks you don’t control and manage directly), a company should focus on limiting what can leave these networks. This can be done by introducing different network tiers and controls with a mapping of what data can move between tiers. This will form the beginning of a third-party trust model. Limiting employee access to key data within the business from a “need to know” access model will also be a key part of the trust model. The shift won’t be an easy one, but in my opinion, it is a concept that needs to be adopted as part of a larger security program. To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The state of cybersecurity in 2022 Read More »

Hikvision's

Hikvision’s Solar-Powered Security Camera

Hikvision’s Solar-Powered Security Camera Setup perfectly suits areas where you need robust performance but power supplies and Ethernet cables cannot reach. Hikvision’s Solution can be deployed by one person and provides great cost efficiency, stability, and ease of use. No network cable required  Powered by solar energy, this kit sets up without any electrical wiring. The built-in battery supports smart power management and long-term power storage, up to 7 days of continues operations in the absence of direct sunlight. Easy installation Lightweight and professional modularized design make the set up possible without mechanical equipment, vastly reducing the installation costs and time. Can withstand bad weather  Designed for outdoors, solar-powered camera setups are prone to extreme weather such as strong wind and rainstorms. Hikvision’s solar-powered camera setups are built sturdy and stable. Hikvision is an IoT solution provider with video as its core competency. Featuring an extensive and skilled R&D workforce, Hikvision manufactures a full suite of comprehensive products and solutions for a broad range of vertical markets. In addition to the security industry, Hikvision extends its reach to smart home tech, industrial automation, and automotive electronics industries to achieve its long-term vision. Hikvision products also provide powerful business intelligence for end users, which can enable more efficient operations and greater commercial success. To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Hikvision’s Solar-Powered Security Camera Read More »

Moser

ASSA ABLOY Opening Solutions appoints David Moser

David Moser has been appointed as Senior Vice President & Head of Digital Access Solutions EMEIA. He succeeds Stephanie Ordan in the post, who became Executive Vice President & Head of ASSA ABLOY Global Solutions late in 2021. Moser’s role will focus on continuing to strengthen ASSA ABLOY’s position in access control solutions across EMEIA. He will oversee the continued efforts in market education and exciting product developments from ASSA ABLOY’s brands across Europe, the Middle East, Africa, India and the SAARC countries. ASSA ABLOY’s access control solutions are trusted in multiple sectors including education, healthcare, multi-family housing, offices, public institutions, critical infrastructure and many more. Moser joined ASSA ABLOY in 2017 where he has held the role of CTO and Vice President of Product Innovation for the last four and a half years, leading the transformation of the division’s innovation and product development organisation and has been at the centre of the digital transformation journey. Moser joined ASSA ABLOY from the automotive industry, where he held several international management positions in product development and management, operations and marketing. “I am proud to lead the next chapter of ASSA ABLOY Opening Solutions EMEIA’s digital transformation, with focus on the international expansion of our existing and new product lines. The Incedo Ecosystem remains at the core of our digital strategy, and we will continue to extend this formidable IoT Platform with access control and electro-mechanical locking devices. The next steps of Incedo’s evolution is to provide offline functionality through the Cloud, combined with key-based digital cylinders which do not require batteries and are powered by our sustainable energy-harvesting technology. Incedo will then start combining the best of ASSA ABLOYs leading technologies that will create maximum value for our customers.”   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

ASSA ABLOY Opening Solutions appoints David Moser Read More »

cybersecurity

The state of cybersecurity in 2022

Michael Aminzade, VP of Consulting Advisory Services at Viking Cloud, discusses the state of cybersecurity in 2022 Cybercrime has been on the rise, with the first half of 2021 seeing a 93% increase from the same time in 2020. As a result, the state of cybersecurity has had to shift dramatically. This has made it a difficult subject to follow for many organisations. As businesses focus on the changing approaches to work and new expectations from customers, risks created by cybercrime are being treated as a low priority. Part of the problem is a lack of basic understanding around the state of cybersecurity at large. This isn’t because of negligence, rather the landscape is shifting so much that it’s hard to keep track of. So, in this article, I will highlight three of the most significant changes to the state of cybersecurity in 2022. This way, it will be easier for an organisation’s cybersecurity team to know where to focus first on the ongoing battle against cybercrime. Working From Home The last two years have been tarnished by the COVID-19 pandemic. To survive these turbulent times, organisations had to adapt – and not just to changes in cyberattacks. The pivot to working from home for many businesses came with concerns, but the proof has been in the pudding for many businesses who have prevailed in spite of COVID, highlighting it is possible for employees to work from home and still deliver. Whether a company allows working from home to continue long term will influence the digital security of the network. The obvious issue with working from home is it introduces several more entryways into a network. Even if employees have company mandated laptops and phones updated to have the best digital security programmes covering them, the home network an employee would use would naturally have their own devices connected. Smart TVs, personal smart devices and even home computers won’t be protected by a business’s vulnerability management solution, making it a potential route for hackers to get onto a network. While this might mean the better option would be to force employees to work back at the office to reduce security risks, this can have different consequences and produces other forms of security risk. An employee might prefer working from home, and being forced to come back into the office could lead to several social engineering issues. A lack of motivation to work leads to a lack of tact and care, which hackers can exploit. In the most extreme cases, it may even lead to an employee becoming an insider threat. There are still a lot of challenges in this space that need tackling, and we will see that throughout 2022. Training employees about the risks working from home brings to both the business and their own personal data is a good start. Another tactic is to limit the number of third parties that come into contact with your data who lack any contractual obligation to keep it safe. There are multiple ways to achieve this; encryption, controlled access, virtual desktops data are just a few examples. A less immediate action that can be taken by an organisation (but one that will surely help) is a shift in focus to how data is handled. Rather than focusing on what is trying to enter the network (especially with networks you don’t control and manage directly), a company should focus on limiting what can leave these networks. This can be done by introducing different network tiers and controls with a mapping of what data can move between tiers. This will form the beginning of a third-party trust model. Limiting employee access to key data within the business from a “need to know” access model will also be a key part of the trust model. The shift won’t be an easy one, but in my opinion, it is a concept that needs to be adopted as part of a larger security program. To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The state of cybersecurity in 2022 Read More »

meeting

Using virtual meeting platforms securely

Research by NordVPN shows that Americans, on average, spend 2 hours and 5 minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams. With those platforms gaining popularity, cybersecurity experts warn users about the dangers of being scammed and infected by malware through them. “Since the beginning of the Covid-19 pandemic, cybercriminals have been using visual meeting platforms as a new way to reach their victims. This resulted in new attacks that app developers were not ready for, including virtual meetings being disrupted by pornography and hate images, private meetings being made public, and many more serious issues,” Daniel Markuson, a cybersecurity expert at NordVPN, said. The most recent reports on those cybercrime activities included the FBI public service announcement on February 16, which stated that criminals are using virtual meeting platforms for BEC (business email compromise) scams. Another issue was reported on February 17 by mail security provider Avanan, when hackers were spotted attaching .exe files to Microsoft Teams chats to install a trojan on an unsuspecting user’s device. Explaining the dangers A BEC scam is when a criminal hacks a business email account (a CEO’s, for example) to trick other employees into transferring money or giving up important company information. This is not a new issue. Losses related to these types of attacks increased to $1.8 billion in 2020, according to an FBI report (compared to $1.2 billion in 2018). “The rise is associated with virtual meeting platforms’ usage to perform scams. Instead of sending a phishy email, criminals organise a video call on the hacked person’s end and pursue their colleagues to make money transfers, using deep-fake audio or instructing them via chat,” Markuson explained. Criminals can also send an email asking employees to make a transaction, stating that the managing employee whose email account they hacked is currently in the meeting and cannot make a payment themselves. “Malware can also be transferred through the chat section of the visual meeting platform. The biggest issue with these dangers is that there is very little a product developer can do at that point if the user is not well-informed or other points of a person’s communication (email or social media) are not secured in a proper way,” Makuson said. “Even though many of us typically use virtual calling for work, it is important to stay cautious outside of it as well,” said Markuson, a cybersecurity expert at NordVPN. To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Using virtual meeting platforms securely Read More »

Scroll to Top