Who’s keeping your things secure?


Your “security things”—physical security software, systems and devices—are connected to help keep your people, assets and data safe. But have you thought about what could happen if one of those security things were to become compromised?

The cost of cybercrime


An improperly installed or inadequately secured device that’s part of the IoT can have a huge impact. Without the proper protection, cyber criminals can gain access to vulnerable devices, including video surveillance cameras and door controllers, and attack all manner of sensitive data and systems. Whether we calculate the damage in terms of financial loss or violation or denial of service, the results can be devastating. And, all too often, you don’t even know it’s happening until it’s much too late. What measures have you put in place to secure your physical security system?



$375-$575B

The exact cost of criminal cyber activity is difficult to determine as organizations are not immediately aware when a breach has occurred. The estimated global cost is between $375 and $575 billion. (The Insurance Institute of Canada)
A surprising number of enterprise companies did not even know if they had experienced a data breach in the past 12 months*.

23%

197 Days

A lack of coordination between IT and the CISO can lead to delays in detection. It takes a median 205 days for organizations to detect a breach or cyberattack. (FireEye’s 2015 M-Trends)
It can take financial institutions 3 months to detect a data breach, leading to patchwork solutions—that don’t speak to one another—being applied to legacy systems. (Ponemon Institue)

98 Days

32%

Hardening security systems against potential threats is key. Yet 32% of enterprise companies surveyed feel they are not prepared for an IoT data breach*.
Security professionals report that their organization is well prepared for IoT threats*, leaving many organizations vulnerable to criminal cyber activity.

1 in 5

BOOKMARK

A surprising number of enterprise companies did not even know if they had experienced a data breech in the past 12 months*.

CAMERA

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

23%

 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

197

Days

A lack of coordination between IT and the CISO can lead to long delays in detecting a data breech. The delay can be more than half a year for retailers. (Ponemon Institue

98

Days

It can take financial institutions 3 months to detect a data breech, leading to patchwork solutions—that don’t speak to one another—being applied to legacy systems. (Ponemon Institue)

32%

 

32% Hardening security systems against potential threats is key. Yet 32% of enterprise companies surveyed feel they are not prepared for an IoT data breech*.

1 in 5

 

Security professionals report that their organization is well prepared for IoT threats*, leaving many organizations vulnerable to criminal cyber activity.

 

* 2016 Cyber Security Survey conducted by Genetec and Security Management Magazine.



Did you know?


A security researcher recently set up a test to see how long it would take for a newly installed mid-range camera to be compromised. It took just 98 seconds for the device to become infected with the Mirai malware, turning it into yet another Botnet able to attack internet services.


+38%

More security incidents were detected in 2015 than in the previous year.

+56%

More hard intellectual property thefts in 2015 vs 2014

1.5B

Cameras hijacked in 2016 to make an unprecedented DDoS attack

665 GB

Estimated traffic per second during the DDoS attack

500M

Yahoo user accounts had data stolen in 2014 during what may be the largest cybersecurity breach ever

12 miles

At this distance, a team of hackers was able to interfere with the brakes, door locks and other electronic features on a Tesla Model S

Why is cybercrime on the rise?


Supply chains are increasingly interconnected
Malevolent actors are becoming more sophisticated
Cyber threats and attacks are on the rise
Inadequate security policy and process governance
Poor password hygiene
Control system networks shared with other traffic
Supply chains are increasingly interconnected Malevolent actors are becoming more sophisticated Cyber threats and attacks are on the rise
Inadequate security policy and process governance Poor password hygiene Control system networks shared with other traffic


How you can protect your physical security system:



Encryption

Hide and protect data from unauthorized users.

Authentication

Determine if an entity is who it claims to be and verify if and how it should access your system.

Authorization

Allow administrators to specify rights and privileges for users.

Privacy

Ensure the privacy of video and protect the identity of anyone captured in it.

Installation

Verify that all devices are properly installed and password protected.

Audit

Know your system, its components and their vendors.

Communicate

Address cybersecurity throughout your organization including at the most senior levels.

Prepare

Continue to update your cybersecurity strategies to stay ahead of the rapidly evolving nature of cybercrime.

Encryption

Hide and protect data from unauthorized users.

Authentication

Determine if an entity is who it claims to be and verify if and how it should access your system.

Authorization

Allow administrators to specify rights and privileges for users.

Privacy

Ensure the privacy of video and protect the identity of anyone captured in it.

Installation

Verify that all devices are properly installed and password protected.

Audit

Know your system, its components and their vendors.

Communicate

Address cybersecurity throughout your organization including at the most senior levels.

Prepare

Continue to update your cybersecurity strategies to stay ahead of the rapidly evolving nature of cybercrime.

WANT AN HONEST TESTIMONIAL?

Lisa Smith

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

David Brown

All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words.

Mark Snow

If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text.

Karen Schultz

Lorem Ipsum which looks reasonable. The generated Lorem Ipsum is therefore always free from repetition, injected humour, or non-characteristic words etc.

Lisa Smith

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

David Brown

All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words.

About Genetec


As part of the IoT, IP-based physical security systems play a big role in our public and private networks, and, given their increasing size and distribution, it’s important that we keep them secure. Hardening our security systems against criminal cyber activity is becoming a primary concern for governments and organizations alike. It’s clear we need to be better prepared.

At Genetec™, we develop solutions that can secure all aspects of your physical security system, including communications, servers and data, both on-premises and in the Cloud. With strategies including security at the edge, encryption, authentication and authorization, we are working to ensure the security of your security system.

L

orem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.