How secure is your security?

Risk management is not about certainties, it is about ranking uncertainties by probability and impact. These risks can come from various sources including the manufacturers that produce the hardware and software you choose. In an age of state-sponsored hacking, and increased cyberattacks, trust has never been so crucial. Your physical security equipment is a potential entry point to your network and critical infrastructure – and you should select partners that have your network's best interests at heart.

Top questions to ask


Your physical security system is as secure as the weakest point or the least trusted device connected to it. It’s that simple. To help you select manufacturers that build their business on cybersecurity best practices, here are 5 questions you should be asking:


How transparent are vendors with cyber vulnerabilities?

Effective IoT device security does not mean creating a perfect product that never has any vulnerabilities; it means allowing for a process that quickly and completely addresses vulnerabilities. Full transparency provides customers with confidence and demonstrates the company is acting responsibly. In the event of a security breach or cyber vulnerability, do you trust that vendors will disclose the breach as soon as possible? Or will they try to conceal it for months giving attackers time to exploit these vulnerabilities?

Do vendors have a comprehensive strategy in place to close security gaps and vulnerabilities?

To create a successful cybersecurity strategy, you need to understand what you must defend against. Proactively monitoring the market and potential threat actors is crucial as security gaps create an information security risk which can lead to data loss, breaches, and violations of privacy laws. What comprehensive strategy do they have in place to manage these risks?

Do vendors prioritize security in the development of their products?

Adopting a "Secure by Design" approach to device manufacturing, and prioritizing users' privacy are key components in promoting transparency, trust, and security in this age of IoT. Companies that are committed to cybersecurity best practices build-in security at every step of development. Are vendors building systems that are resilient and capable of withstanding multiple failures? Do they perform regular 3rd part auditing and penetration tests?

Who’s liable if your equipment is used to access private information?

If your devices get hacked, will the vendor be held liable? Too often, the end user must discover and report liabilities because the device manufacturer does not take that responsibility. Not doing your due diligence when choosing security solutions or simply disregarding the fact that some of your equipment is unsafe could result in lawsuits, fines, and reputational damage. Will your organization take the blame for choosing to partner with an untrustworthy vendor?

Who owns the manufacturing company that builds their software and hardware?

Foreign government-owned vendors are known to participate in cyber-criminal activities using "backdoor" vulnerabilities to gain cutting-edge technology and know-how, at their buyers’ expense. These vendors can tap into your devices at any point in time to execute denial of service attacks on a third party, or, more troublingly, they can use their IP cameras to act as a convenient gateway into your private network. Are you willing to take that risk?



Did you know?


$6 trillion

The estimated annual cost of cybercrime by 2021(Cybersecurity Ventures)
Increase in annual number of ransomware attacks in 2018 (The Cost of Cybercrime, Accenture)

350%

$600B

Annual cost of intellectual property theft in the US (The United States Trade Representative)
The average cost of each lost or stolen record containing sensitive and confidential information (Ponemon Institute)

$150 US

38%

The percentage of organizations saying that it is unlikely or highly unlikely that they would be able to detect a sophisticated attack.(EY)
Bill passed by the US House of Representatives and signed into law by the President of the United States in August 2018 banning the use of surveillance technology from five foreign state-owned vendors who are described as selling "risky technology" linked to a foreign country's "intelligence apparatus".(Congress.gov)

H.R. 5515

BOOKMARK

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

CAMERA

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

23%

 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

197

Days

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

98

Days

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

32%

 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

1 in 5

 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

Ways you can protect your physical security system:


Encryption

Hide and protect data from unauthorized users.

Authentication

Determine if an entity is who it claims to be and verify if and how it should access your system.

Authorization

Allow administrators to specify rights and privileges for users.

Privacy

Ensure the privacy of video and protect the identity of anyone captured in it.

Encryption

Hide and protect data from unauthorized users.

Authentication

Determine if an entity is who it claims to be and verify if and how it should access your system.

Authorization

Allow administrators to specify rights and privileges for users.

Privacy

Ensure the privacy of video and protect the identity of anyone captured in it.


Build a strong foundation of trust with a partner you can rely on.


Want to learn more about our approach to cybersecurity?



WANT AN HONEST TESTIMONIAL?

Lisa Smith

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

David Brown

All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words.

Mark Snow

If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text.

Karen Schultz

Lorem Ipsum which looks reasonable. The generated Lorem Ipsum is therefore always free from repetition, injected humour, or non-characteristic words etc.

Lisa Smith

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

David Brown

All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words.

GRAB OUR BOOK NOW

All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary.

21

U.S. DOLLARS

WHY WE ARE SO AMAZING?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when a printer took a galley of type and scrambled it to make a type specimen book.

L

orem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.