<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Physical Security Archives - My TechDecisions</title>
	<atom:link href="https://mytechdecisions.com/category/physical-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://mytechdecisions.com/category/physical-security/</link>
	<description>The end user’s first and last stop for making technology decisions</description>
	<lastBuildDate>Mon, 02 Feb 2026 01:05:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://mytechdecisions.com/wp-content/uploads/2017/03/cropped-TD-icon1-1-32x32.png</url>
	<title>Physical Security Archives - My TechDecisions</title>
	<link>https://mytechdecisions.com/category/physical-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Security Integrators Can Reach IT Decision-Makers More Effectively</title>
		<link>https://mytechdecisions.com/physical-security/how-security-integrators-can-reach-it-decision-makers-more-effectively/</link>
					<comments>https://mytechdecisions.com/physical-security/how-security-integrators-can-reach-it-decision-makers-more-effectively/#respond</comments>
		
		<dc:creator><![CDATA[Alex Halliday]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 01:05:20 +0000</pubDate>
				<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Alex Halliday]]></category>
		<category><![CDATA[Genetec]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51474</guid>

					<description><![CDATA[<p>Editor&#8217;s Note: Another version of this article originally appeared on our sister-site Security Sales &#38; Integration on January 28, 2026. It has since been updated for My TechDecisions&#8217; audience. More system integrators are beginning to recognize that IT departments hold greater influence over technology investments that were once managed solely by security teams, particularly when [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/physical-security/how-security-integrators-can-reach-it-decision-makers-more-effectively/">How Security Integrators Can Reach IT Decision-Makers More Effectively</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><!--StartFragment --></p>
<p class="pf0"><em><span class="cf0">Editor&#8217;s Note: Another version of this article originally appeared on our sister-site </span></em><a href="https://www.securitysales.com/insights/how-security-integrators-reach-it-decision-makers/616595/" target="_blank" rel="noopener"><span class="cf0">Security Sales &amp; Integration</span></a><em><span class="cf0"> on January 28, 2026. It has since been updated for My TechDecisions&#8217; audience.</span></em></p>
<p><!--EndFragment --></p>
<p>More system integrators are beginning to recognize that IT departments hold greater influence over technology investments that were once managed solely by security teams, particularly when cybersecurity is involved.</p>
<p>This shift reflects a simple reality: IT is ultimately responsible for managing the organization’s technology risk. When new devices or systems introduce cybersecurity vulnerabilities, IT teams are accountable for identifying and mitigating that exposure.</p>
<p>From an IT perspective, attack vectors can take many forms—not just cameras or software but also smart lighting, access control hardware or other IoT-connected devices.</p>
<p>A 2017 incident in which criminals accessed a casino’s network through a connected fish tank illustrates why IT teams approach new technology with skepticism: even seemingly harmless systems can become entry points for attackers. If they cannot confidently say a system is secure and compliant, the safest option is to say no.</p>
<p>This hesitation is not about being overly cautious. IT leaders are accountable for protecting sensitive assets, including intellectual property, employee records and financial data. Failure to perform due diligence can expose the organization to regulatory penalties, reputational damage and operational disruption.</p>
<p>This shift requires system integrators to move away from feature-driven product discussions and toward platform-level outcomes. Security teams may be excited by new capabilities and technologies but IT teams first want to understand how a platform manages risk.</p>
<p>Integrators should be prepared to explain how a solution reduces complexity, limits liability and minimizes human error by automating routine tasks.</p>
<h2><strong>What Security System Integrators Can Consider When Speaking to the IT Buyer</strong></h2>
<p>Speaking IT’s language—data governance, network impact, cybersecurity posture—goes a long way toward building trust. Integrators who address IT concerns early can reduce objections, shorten review cycles and build confidence with IT.</p>
<p>In practice, here are a few things system integrators can address:</p>
<p><strong>Compatibility with the existing technology stack</strong></p>
<ul>
<li>Open integrations that support single sign-on (SSO), cloud platforms and established systems</li>
<li>Flexible deployment models that work in on-prem, cloud or hybrid environments</li>
<li>Built-in interoperability through strong APIs or widely adopted standards</li>
</ul>
<p><strong>Cybersecurity and regulatory compliance</strong></p>
<ul>
<li>Data protection measures such as end-to-end encryption to support confidentiality and privacy</li>
<li>Compliance capabilities aligned with relevant regulations and standards, depending on region and sector</li>
<li>Role-based access controls and multi-factor authentication to prevent unauthorized access</li>
<li>Audit trails and activity logs that support oversight and compliance monitoring</li>
<li>Recognized cybersecurity certifications and standards for cloud-based services</li>
</ul>
<p><strong>Reliability and system resiliency</strong></p>
<ul>
<li>Defined service level agreements (SLAs) that support continuous operations</li>
<li>Disaster recovery capabilities, including automated failover and business continuity strategies</li>
<li>Scalable performance that supports growth without degrading system reliability</li>
</ul>
<h2><strong>Bringing IT and Security Teams Together</strong></h2>
<p>Integrators are uniquely positioned to act as a bridge between IT and security, helping both sides understand each other’s priorities. In the IT world, subscription-based software and ongoing maintenance agreements are standard. In contrast, security teams have historically favored one-time system purchases that are maintained internally. Navigating these differences requires clear communication and expectation-setting.</p>
<p>Because many IT buyers do not come from a physical security background, integrators should expect to explain not only what they are proposing but how it will affect IT workloads and responsibilities. This creates an opportunity to reframe the conversation around benefits that matter to IT teams, such as interoperability, scalability, resiliency and long-term maintainability.</p>
<p>Integrators can also look for areas of natural alignment with IT goals, including compliance, data protection and on-prem versus cloud deployment strategies. When a solution includes built-in safeguards—such as cybersecurity hardening guides, security posture scoring or controls that restrict access to authorized users—these should be highlighted early in the discussion.</p>
<p>Automation is another strong point of connection. IT teams are often stretched thin and are drawn to solutions that reduce manual effort through centralized management, automated updates or simplified configuration.</p>
<p>While many IT stakeholders favor cloud-based software-as-a-service models for their continuous delivery of patches and improvements, governance preferences vary. Some organizations want direct control over deployments, while others prefer automatic updates.</p>
<p>Integrators who understand these governance models can recommend solutions that align with how IT teams prefer to work—making approvals faster and deployments smoother.</p>
<h2><strong>Get Buy-In Early in the Process</strong></h2>
<p>For integrators, working effectively with IT is more critical than ever. It’s no longer enough to simply invite IT to the table late in the process. Integrators need to understand IT’s priorities, preferences, and goals from the outset—and adapt their approach accordingly. Security solutions are far more likely to be approved when they align with the organization’s established IT best practices, governance models and risk tolerance.</p>
<p>Today, there are very few scenarios in which a security deployment would not require IT review and sign-off. Even systems designed to be isolated or air-gapped must be assessed to confirm how they are installed, maintained and updated and to ensure no unintended connections introduce vulnerabilities.</p>
<p>To adapt to this reality, integrators need to build credibility through early and consistent engagement with IT, ideally starting with the very first meeting. Bringing IT into the process early helps ensure that security decision-makers are aligned with current network security, governance and compliance requirements.</p>
<hr />
<p><em>Alex Halliday is <a href="https://www.genetec.com/about-us" target="_blank" rel="noopener">director of channel enablement, North America, sales,</a> at <a href="https://www.securitysales.com/tag/genetec/" target="_blank" rel="noopener">Genetec.</a></em></p>
<p>The post <a href="https://mytechdecisions.com/physical-security/how-security-integrators-can-reach-it-decision-makers-more-effectively/">How Security Integrators Can Reach IT Decision-Makers More Effectively</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/physical-security/how-security-integrators-can-reach-it-decision-makers-more-effectively/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Singlewire Software on Mass Notification Solutions</title>
		<link>https://mytechdecisions.com/facility/singlewire-software-on-mass-notification-solutions/</link>
					<comments>https://mytechdecisions.com/facility/singlewire-software-on-mass-notification-solutions/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 14:19:20 +0000</pubDate>
				<category><![CDATA[Facility]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Campus Safety]]></category>
		<category><![CDATA[Mass Notification]]></category>
		<category><![CDATA[Singlewire Software]]></category>
		<category><![CDATA[workplace safety]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51410</guid>

					<description><![CDATA[<p>Watch Jim Grass of Singlewire Software discuss mass notification solutions, opportunities for integrators and improving workplace safety.</p>
<p>The post <a href="https://mytechdecisions.com/facility/singlewire-software-on-mass-notification-solutions/">Singlewire Software on Mass Notification Solutions</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In an exclusive interview with My TechDecision&#8217;s sister-site <em>Commercial Integrator,</em> Jim Grass, vice president of sales, Singlewire Software, reflects on key opportunities in the ascendent mass notification category and how integrators can deliver real value in the space.</p>
<p>At the outset of the conversation, Grass reflects on the state of the workforce today. Post-pandemic, workforces continue to be mobile and fluid, with a strong continuing trend of &#8220;hoteling&#8221; workers who are not tethered to a particular space. &#8220;Being able to communicate to those people effectively can be a challenge,&#8221; Grass acknowledges. Plus, we continue to see far too many unthinkable situations in workplaces across the country. Sadly, companies need to be prepared to deal with them.</p>
<h2><strong>Singlewire Software Helps Integrators Pursue Mass Notification</strong></h2>
<p>Singlewire Software, of course, plays a leading role in partnering with integrators exploring the mass notification category. According to Grass, &#8220;<a href="https://www.singlewire.com/" target="_blank" rel="noopener">Our tagline is &#8216;Detect, Notify and Respond,&#8217;</a> and that&#8217;s what we really help customers do. And we help our channel partners work with customers to better detect the issues happening, notify their staff of what&#8217;s going on, and better respond and more quickly respond to the issues that might be out there.&#8221;</p>
<p>What makes Singlewire Software different, Grass says, comes down to this: It&#8217;s really that facility-based communication platform. &#8220;We are just software-based. So, we help customers leverage their current infrastructure and maybe infrastructure that they&#8217;re looking at purchasing.&#8221; So, if a customer is looking to upgrade to IP speakers or wanting to shift to a hosted phone system, Grass says, Singlewire Software can &#8220;&#8230;help enable those type of technologies to better communicate daily or in the case of emergencies.&#8221;</p>
<p>Later in the interview, Grass makes clear that he believes all integrators should be looking at the mass notification category. And he underscores that Singlewire Software stands ready to help channel partners realize more revenue and become stickier with their customers.</p>
<p>Grass particularly highlights abundant opportunity (and need) in healthcare, K-12, retail, manufacturing and other verticals. &#8220;Those types of customers really have the need for technology such as this,&#8221; he declares.</p>
<p>Watch the full video Q&amp;A below for the whole story on mass notification from Singlewire Software and Jim Grass.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/R_aDveY3EwM?si=Qqd7NLtRQoy8dOYI" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>The post <a href="https://mytechdecisions.com/facility/singlewire-software-on-mass-notification-solutions/">Singlewire Software on Mass Notification Solutions</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/facility/singlewire-software-on-mass-notification-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>North Syracuse Central School District Streamlines Communications with AtlasIED IPX Technology</title>
		<link>https://mytechdecisions.com/project-of-the-week/north-syracuse-central-school-district-streamlines-communications-with-atlasied-ipx-technology/</link>
					<comments>https://mytechdecisions.com/project-of-the-week/north-syracuse-central-school-district-streamlines-communications-with-atlasied-ipx-technology/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 18:10:29 +0000</pubDate>
				<category><![CDATA[Audio]]></category>
		<category><![CDATA[Facility]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Project of the Week]]></category>
		<category><![CDATA[Unified Communications]]></category>
		<category><![CDATA[AtlasIED]]></category>
		<category><![CDATA[Informacast]]></category>
		<category><![CDATA[IPX]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=49070</guid>

					<description><![CDATA[<p>The North Syracuse Central School District (NSCSD), a K-12 public school district in Central New York state, serves the communities of North Syracuse, Clay, Cicero, Bridgeport and Mattydale. With 11 elementary, middle and high schools, the district covers almost 90 square miles and has 7,792 students and approximately 700 teachers. With some of its school [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/project-of-the-week/north-syracuse-central-school-district-streamlines-communications-with-atlasied-ipx-technology/">North Syracuse Central School District Streamlines Communications with AtlasIED IPX Technology</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The North Syracuse Central School District (NSCSD), a K-12 public school district in Central New York state, serves the communities of North Syracuse, Clay, Cicero, Bridgeport and Mattydale. With 11 elementary, middle and high schools, the district covers almost 90 square miles and has 7,792 students and approximately 700 teachers. With some of its school buildings over 60 years old, the district needed to renovate many of them, some more urgently than others.</p>
<p>As part of the process, district administrators and staff reevaluated all infrastructure elements and their approach to campus safety, selecting <a href="https://www.atlasied.com/ipx-series-overview" target="_blank" rel="noopener">AtlasIED IPX technology</a> to modernize their intercom, audio announcements, and emergency communications systems.</p>
<p>The district began renovating in phases, prioritizing schools based on the state of the school buildings and the level of urgency of repairs. Before renovations, the schools in the district used similar audio communications technologies that had been in use for 10-20 years, including the public address (PA) system, clocks and blue light systems for emergencies.</p>
<p>However, the systems were siloed and did not integrate. During routine use, such as all-school announcements at the beginning of school days, the system functioned as needed, but during drills, the number of systems in operation caused the schools challenges.</p>
<p>&#8220;With the old system, when we conducted a lockdown drill, school staff needed to activate the different systems manually, which created steps and more possibilities for human error,&#8221; says Matt Erwin, director of facilities for North Syracuse Central Schools. Erwin manages maintenance and operations, plus security, health and safety, and the capital work for the district.</p>
<h3><strong>AtlasIED IPX Series for Campus Audio &amp; Communication System</strong></h3>
<p>The district had two primary goals when upgrading the campus audio and communications systems: to improve the audio quality and find a plan to increase the speed at which a school could react and contact first responders during an emergency. They wanted to achieve these goals without having to install a system that was too complicated for staff and personnel.</p>
<p>Because the district used a Cisco phone system, Erwin and his team wanted a platform that integrated with these devices. As they researched and discussed options, their partners at <a href="https://dayautomation.com/" target="_blank" rel="noopener">Day Automation</a>, a building automation and security solution provider, introduced them to <a href="https://mytechdecisions.com/tag/AtlasIED/" target="_blank" rel="noopener">AtlasIED</a>, which they eventually chose as their long-term audio and communications solution. The AtlasIED IPX Series met all of the criteria for the district.</p>
<p>AtlasIED&#8217;s IPX Series features a range of communication endpoints that interconnect. The IPX endpoints integrate multiple functions into single products, including loudspeakers, two-way microphones, flashers, and an LED display for a clock, date, or other text-based messages that can be updated in real-time during an emergency.</p>
<h3><strong>Installing IPX Endpoints at Bear Road and Smith Road Elementary School </strong></h3>
<p>Karl W. Saile Bear Road Elementary, known simply as Bear Road Elementary, became the district&#8217;s first school to install a new audio and communications system. Originally built in 1958, Bear Road Elementary was one of the district&#8217;s oldest buildings. During the Bear Road project, the school renovated half the building at a time to avoid a full closure and completely modernized the interior and infrastructure to accommodate staff and student needs.</p>
<p>The team at Day Automation identified locations for IPX endpoints throughout the school and ran Ethernet cable to each site in preparation to connect the endpoints. The IPX endpoints are Power over Ethernet (PoE+)-enabled, receiving power and network signals through the same IT network the school uses to deliver Internet access. The IPX platform helped simplify the installation process for integrators by reducing the number of cable types needed.</p>
<p>Another NSCSD school, Smith Road Elementary, began its retrofit project in 2022 to update various technologies, including its audio and communications technology systems, and upgrade building infrastructure. Working around class schedules to avoid disrupting students, the school expanded and updated its campus IT network and created plans to locate IPX endpoints.</p>
<p>Once the construction teams pulled Ethernet cabling to predetermined locations in both schools, the contractor teams began installing IPX endpoints, including the dual-sided <a href="https://www.atlasied.com/ip-dds" target="_blank" rel="noopener">IP-DDS</a> endpoint mounted from side walls and hung over high-traffic areas like hallways.</p>
<p>They also added <a href="https://www.atlasied.com/ip-sdmf" target="_blank" rel="noopener">IP-SDMF</a> indoor wall-mount endpoints in classrooms, the main office, the cafeterias, the gymnasiums, nurses office, and all rooms to ensure comprehensive building coverage. On the ceilings, the district installed the <a href="https://www.atlasied.com/IP-8SM" target="_blank" rel="noopener">IP-8SM</a> in multiple locations, which offer a loudspeaker and an omnidirectional microphone to allow two-way communication and monitoring from the speaker location to any PC or phone handset.</p>
<p style="text-align: center;"><a href="https://mytechdecisions.com/compliance/how-mass-notification-is-evolving-to-manage-emergencies/" target="_blank" rel="noopener"><strong>Related: How Mass Notification is Evolving to Manage Emergencies</strong></a></p>
<h3><strong>Mass Communications through Singlewire and IPX Devices  </strong></h3>
<p>The IPX Series also helped NSCSD incorporate campus safety capabilities with the help of <a href="https://www.atlasied.com/singlewire-informacast" target="_blank" rel="noopener">InformaCast Mass Notification Software from Singlewire</a>. Using InformaCast, during an emergency, designated school personnel can initiate the software from a mobile device wherever they are on or off campus. The software then instantaneously sends text messages to faculty, students, parents&#8217; mobile devices, alerts law enforcement, and activates attention-grabbing audio communication, flashing visual alerts and LED text messages on the installed IPX devices throughout campus.</p>
<p>Also, using InformaCast, the IP-8SM ceiling speakers can be configured to allow first responders to communicate with people near the loudspeaker or listen in to that area. The speakers can be critically important when personnel, students, or perpetrators barricade themselves in classrooms or other rooms.</p>
<p>When connected to InformaCast, the loudspeakers become a critical two-way hands-free communications tool for law enforcement or school personnel to deliver directions, provide or receive real-time updates near the speak location, or listen to activities within a space.  The loudspeakers are especially important when staff, students, or perpetrators barricade themselves in classrooms or other rooms.</p>
<p>The district has implemented new routine and emergency safety procedures in the schools with InformaCast and IPX due to the upgraded capabilities offered by the technology. It has begun to train staff regularly to help them become more familiar with operating the equipment. Training staff for both routine operation and operating the system during an emergency when people are under much more stress has the potential to lead to human error. This is why automating the system using pre-recorded messages offered via InformCast can help reduce the chance of human error during a real incident.</p>
<p>While the expectation is that much of the system&#8217;s use will be for routine daily announcements, InformaCast software helps automate many of the formerly manual steps in the older system&#8217;s procedures.</p>
<p>&#8220;Gone are the days when we had to find a panic button or go to a specific location to access the PA system,&#8221; says Erwin. &#8220;The new AtlasIED systems give us much more functionality at every point within the building. Based on the successful installation at Bear Road and Smith Road, we now look at mass notification across the entire district differently.&#8221;</p>
<h3><strong>A Better, Safer Experience </strong></h3>
<p>From the district&#8217;s experience at Bear Road Elementary and Smith Road Elementary, it plans to install IPX and InformaCast throughout the rest of the district school buildings. As plans develop and ongoing training continues at the schools currently outfitted with IPX and InformaCast, Erwin and his team are eager for additional school buildings to use the new technology and create a better and safer experience district-wide for the students and staff moving forward.</p>
<p><em><strong>Click &#8216;View Slideshow&#8217; to see additional photos of the district&#8217;s IPX technology upgrade at Bear Road Elementary and Smith Road Elementary schools.</strong></em></p>
<p><em>Another version of this article originally appeared on our sister-site <a href="https://www.commercialintegrator.com/markets/education/north-syracuse-central-school-district-atlasied-ipx-technology/" target="_blank" rel="noopener">Commercial Integrator</a> on November 6, 2023. It has since been updated for My TechDecisions&#8217; audience.</em></p>
<p>The post <a href="https://mytechdecisions.com/project-of-the-week/north-syracuse-central-school-district-streamlines-communications-with-atlasied-ipx-technology/">North Syracuse Central School District Streamlines Communications with AtlasIED IPX Technology</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/project-of-the-week/north-syracuse-central-school-district-streamlines-communications-with-atlasied-ipx-technology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures</title>
		<link>https://mytechdecisions.com/physical-security/spike-in-cyberattacks-exposes-vulnerabilities-in-university-security-measures/</link>
					<comments>https://mytechdecisions.com/physical-security/spike-in-cyberattacks-exposes-vulnerabilities-in-university-security-measures/#respond</comments>
		
		<dc:creator><![CDATA[Kevin Kirkwood]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 15:35:18 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Facility]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[campus security]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[data]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48986</guid>

					<description><![CDATA[<p>Note: The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to My TechDecisions. As expected from authorities anticipating an increase in threats to the education sector, cyberattacks are continuing to wreak havoc on colleges and universities across the United States. As [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/physical-security/spike-in-cyberattacks-exposes-vulnerabilities-in-university-security-measures/">Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Note: </em><em>The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to My TechDecisions.</em></strong></p>
<p>As expected from <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-249a-0" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">authorities</a> anticipating an increase in threats to the education sector, <a href="https://mytechdecisions.com/tag/cyberattacks/" target="_blank" rel="noopener">cyberattacks </a>are continuing to wreak havoc on colleges and universities across the United States. As of the beginning of May, there had already been 27 <a href="https://therecord.media/colleges-schools-suffer-from-ransomware-and-cyberattacks" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">confirmed</a> ransomware attacks against U.S. institutions. These ransomware numbers only tell part of the story as data breaches, malware attacks, and more account for an even greater number of threats, not all of which are reported to the public as they occur.</p>
<p>The second quarter of 2023 has seen a flurry of cyberattacks strike higher education institutions, including West Virginia’s <a href="https://www.bluefield.edu/bu-cyberattack-updates/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Bluefield University</a>, Tennessee’s <a href="https://www.chattanoogastate.edu/cyber-incident-operational-updates" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Chattanooga State Community College</a>, and Georgia’s <a href="https://den.mercer.edu/mercer-university-statement-on-data-incident/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Mercer University</a>, among others. Beyond the obvious consequences of ransom payments and leaked personal data, some of the most severe attacks in recent memory have culminated in the delay and <a href="https://www.cbsnews.com/news/howard-university-ransomware-attack-cancel-classes/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">cancelation</a> of classes, as well as the <a href="https://www.forbes.com/sites/emmawhitford/2022/04/19/cyberattacks-pose-existential-risk-to-colleges-and-sealed-one-small-colleges-fate/?sh=5c9b7b9f53c2" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">closure</a> of one college in Illinois entirely.</p>
<p>With attacks against higher education on the rise year-over-year, campuses have become one of the top targets for attempted <a href="https://www.campussafetymagazine.com/tag/databreaches/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">data breaches</a>, <a href="https://www.campussafetymagazine.com/tag/ransomware/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">ransomware</a> attacks, <a href="https://www.campussafetymagazine.com/tag/malware/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">malware</a>, and more. Feeling the effects of various financial and/or technological hurdles, most schools are not currently equipped with the security controls to adequately defend themselves from increasingly sophisticated cyber threats that continue to hamper the community.</p>
<p>This increase in cyberactivity should serve as a wake-up call for higher education institutions to reevaluate and enhance their cybersecurity postures. Here are some of the top considerations for higher education leaders seeking to plug the gaps in their cybersecurity strategy.</p>
<h3>Securing Data</h3>
<p>One of the recurring themes in attacks against higher education is the vulnerability of sensitive data. From student, staff, and faculty information to sensitive school records, there are countless data assets that, if breached, can be weaponized against institutions.</p>
<p>Data exfiltration, or unauthorized data transfer, is a leading threat to data security in higher education. To help prevent data loss, colleges and universities need to be able to monitor user and entity behavioral analytics (UEBA) and they need to be able to watch their network using a network detection and response (NDR) tool. This allows schools to detect, qualify, and remediate any anomalous activity at the individual level, as well as malicious or unauthorized attempts at exfiltration.</p>
<h3>Managing Access</h3>
<p>For colleges and universities, student information, research data, and assessment criteria are all critical to daily operations. However, it can be common for institutions to encounter unauthorized access to these types of crucial information due to a lack of IT resources and necessary safeguards. This can result in the loss of confidentiality, integrity, and availability of technological assets, among other things.</p>
<p>To better facilitate and manage user access to sensitive data, schools should implement an effective IT security strategy intentionally designed to protect critical assets. This strategy should include the compartmentalization of data and provide a least privileged approach to accessing that data. Utilizing a least privileged approach, users are only granted access to the data required for their specific roles. This helps to prioritize the protection of intellectual property that is so valuable to higher education institutions. In doing so, schools can better protect the privacy of their students and employees and their reputations.</p>
<h3>Detecting Threats</h3>
<p>Even with cybersecurity mechanisms in place, no security threat can be resolved if it falls undetected. Colleges and universities must be able to detect, alert and automate security response capabilities when threats arise. Institutions should consider adopting security orchestration, automation, and response (SOAR) tools to help standardize and scale their incident response.</p>
<p>By relying on SOAR, schools can automate workflows to accelerate various stages of the threat investigation and response processes. Given the severity of a particular threat, it can be escalated to key decision-makers for a manual response or remediated automatically (or semi-automatically) from a playbook of preselected actions. Ultimately, SOAR is intended to help security teams cut through the noise and allow them to prioritize and direct their attention toward the most pressing threats.</p>
<h3>Protecting and Prospering</h3>
<p>Given the attack patterns of the last two years, cyberattacks in higher education are not going away overnight. Colleges and universities continue to be targeted by malicious actors for a reason. As long as institutions remain underequipped to monitor and respond to cybersecurity threats, they will find themselves with a target on their back.</p>
<p>Regardless of an institution’s budgetary constraints, there are tried and true precautions that can be taken to better protect their campus. Implementing threat detection, stricter access controls, and stronger data security measures are all foundational components of an effective cybersecurity strategy. By solidifying that foundation, colleges and universities can do their part to avoid being next in the line of higher education victims.</p>
<p>Another version of this article originally appeared on our sister-site <a href="https://www.campussafetymagazine.com/university/slew-of-cyberattacks-highlight-gaps-in-university-security/" target="_blank" rel="noopener"><em>Campus Safety</em> </a>on August 14, 2023. It has since been updated for My TechDecisions&#8217; audience.</p>
<hr />
<p><em>Kevin Kirkwood is Deputy CISO for <a href="https://logrhythm.com/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">LogRhythm</a>.</em></p>
<p>The post <a href="https://mytechdecisions.com/physical-security/spike-in-cyberattacks-exposes-vulnerabilities-in-university-security-measures/">Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/physical-security/spike-in-cyberattacks-exposes-vulnerabilities-in-university-security-measures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cyberattacks and Insider Threats During The Development of China&#8217;s C919 Passenger Jet</title>
		<link>https://mytechdecisions.com/network-security/the-cyberattacks-and-insider-threats-during-the-development-of-chinas-c919-passenger-jet/</link>
					<comments>https://mytechdecisions.com/network-security/the-cyberattacks-and-insider-threats-during-the-development-of-chinas-c919-passenger-jet/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Mon, 05 Jun 2023 19:59:22 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Advanced Persistent Threat]]></category>
		<category><![CDATA[Aerospace]]></category>
		<category><![CDATA[C919]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48665</guid>

					<description><![CDATA[<p>Over the weekend, China claimed a major win by launching the first commercial flight of the C919, the country’s first domestically manufactured large passenger jet built by the Commercial Aviation Corporation of China (COMAC). However, some non-China-based aviation manufacturers and cybersecurity firms may opt to use the term “domestically manufactured” loosely. According to CNN, the [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/the-cyberattacks-and-insider-threats-during-the-development-of-chinas-c919-passenger-jet/">The Cyberattacks and Insider Threats During The Development of China&#8217;s C919 Passenger Jet</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the weekend, China claimed a major win by launching the first commercial flight of the C919, the country’s first domestically manufactured large passenger jet built by the Commercial Aviation Corporation of China (COMAC). However, some non-China-based aviation manufacturers and cybersecurity firms may opt to use the term “domestically manufactured” loosely.</p>
<p>According to CNN, the C919’s first flight left Shanghai at 10:32 am. Sunday and landed at the Beijing Capital International Airport at 12:31 p.m. This is being hailed as an important moment in China’s strategy to boost domestic manufacturing by 2025 and reduce reliance on foreign companies in the aviation sector.</p>
<p>While manufactured in China, many of the airplane’s components do come from Western companies. Leading to further scrutiny of the aircraft&#8217;s development are allegations that a Chinese state-aligned adversar conducted cyber intrusions against several of those companies that make the C919’s components. These allegations are detailed in a lengthy and detailed 2019 report from cybersecurity firm CrowdStrike as well as a series of indictments against both cyber actors and <a href="https://mytechdecisions.com/?s=insider+threat">insiders</a>.</p>
<p>CrowdStrike could not be reached for comment, so this article is sourced entirely from the firm&#8217;s report and U.S. Department of Justice indictments.</p>
<p>In CrowdStrike’s report, the company says its research corroborates a series of DOJ indictments released over the course of two years during the C919’s development that highly suggests cyber actors from China, company insiders and state directives targeted foreign companies to fill key technology and intelligence gaps to better compete with against the western aerospace industry.</p>
<p>“What follows is a remarkable tale of traditional espionage, cyber intrusions, and cover-ups, all of which overlap with activity CrowdStrike Intelligence has previously attributed to the China-based adversary TURBINE PANDA,” CrowdStrike said in the 2019 report, alleging that the operations can be traced back to China&#8217;s Ministry of State Security’s (MSS) Jiangsu Bureau, the alleged perpetrators of the infamous 2015 U.S. Office of Personnel Management (OPM) breach.</p>
<h3><strong>Cyberattacks beginning in 2010</strong></h3>
<p>According to CrowdStrike, Turbine Panda, conducted cyber intrusions against between 2010 and 2015 against foreign manufacturers of aviation components, including many that were chosen for the C919.</p>
<p>The state-owned enterprise (SOE) Commercial Aircraft Corporation of China announced in December 2009 that it had chosen CFM International’s (a joint venture between U.S.-based GE Aviation and French aerospace firm Safran, formerly Snecma) LEAP-X engine to provide a custom variant engine, the LEAP-1C, for the then-newly announced C919.</p>
<p>Despite the deal, both COMAC and fellow SOE the Aviation Industry Corporation of China were believed to be tasked by China’s State-owned Assets Supervision and Administration Commission of the State Council (SASAC) with building an “indigenously created” turbofan engine that was comparable to the LEAP-X, CrowdStrike says in its report. In 2016, the Aero Engine Corporation of China produced the CKJ-1000AX engine, which bears multiple similarities to the LEAP-1C engine.</p>
<p>While CrowdStrike admitted that it is difficult to assess if the Chinese engine is a direct copy, the cybersecurity firm said it is highly likely that its makers benefitted significantly from the cyber campaign of the Jiangsu Bureau of the MSS (JSSD).</p>
<p>CrowdStrike, citing its own intelligence reporting and U.S. government sources, says the Chinese government uses a “multi-faceted system” of forced technology transfer, joint ventures, physical theft from insiders and cyber espionage to acquire information to fill key knowledge gaps.</p>
<p>One DOJ indictment, CrowdStrike says, describes initial preparatory action that included compromising Los Angeles-based Capstone Turbine servers and later using a doppelganger site as a strategic web compromise (SWC) in combination with DNS … to compromise other aerospace firms.”</p>
<p>From 2010 to 2015, the linked JSSD operators are believed to have targeted a variety of aerospace-related targets … using two China-based APT favorites, PlugX and Winnti, and malware assessed to be unique to the group dubbed Sakula.</p>
<p>Many individuals associated with the campaign are “assessed to have storied histories in legacy underground hacking circles within China dating back to at least 2004,” CrowdStrike says, citing the DOJ.</p>
<h3><strong>Indictments</strong></h3>
<p>As detailed in CrowdStrike’s report, the U.S. Department of Justice released several indictments from 2017 through October 2018, charging several individuals with activities related to theft of trade secrets and hacking related to the development of the C919.</p>
<p>The indictments were against Sakula developer YU Pingan, JSSD Intelligence Officer XU Yanjun, GE employee and insider ZHENG Xiaoqing, U.S. Army Reservist and assessor JI Chaoqun, and 10 JSSD-affiliated cyber operators.</p>
<p>“What makes these DoJ cases so fascinating is that, when looked at as a whole, they illustrate the broad, but coordinated efforts the JSSD took to collect information from its aerospace targets,” CrowdStrike says in its report. “In particular, the operations connected to activity CrowdStrike Intelligence tracked as TURBINE PANDA showed both traditional human-intelligence (HUMINT) operators and its cyber operators working in parallel to pilfer the secrets of several international aerospace firms.”</p>
<h3><strong>Insiders</strong></h3>
<p>CrowdStrike and the DOJ also <a href="https://passle-net.s3.amazonaws.com/Passle/5c752afb989b6e0f5cda12f4/MediaLibrary/Document/2019-10-18-10-42-26-646-huge-fan-of-your-work-intelligence-report.pdf">detail</a> how insiders and IT employees helped steal information and coverup the cyber activities, offering new insight into how adversaries leverage a wide variety of tools and techniques to accomplish their goals.</p>
<p>According to CrowdStrike and the DOJ, a GE insider was charged with using “an elaborate and sophisticated means” to steal GE trade secrets after being recruited by a Chinese aerospace official closely aligned with the country’s Ministry of Industry and Information Technology.</p>
<p>In addition, IT employees at the Canada-based International Civil Aviation Organization (ICAO), the United Nations body that sets global aviation standards, allegedly covered up a cyber intrusion by another alleged China state-sponsored actor that had been observed targeting the aviation industry.</p>
<p>CrowdStrike, citing public reporting, says the intrusion at ICAO was “likely designed to facilitate a strategic web compromise (SWC) attack … that would easily provide a springboard to target a plethora of other aerospace-related as well as foreign government victims.”</p>
<p><strong>“</strong>Upon being alerted to the breach by the Aviation Information Sharing and Analysis Center (AISAC), the ICAO internal IT investigation staff was reportedly grossly negligent, and the cyber intruders may have had direct access to one of their superuser accounts,” CrowdStrike says in its report. “In addition, a file containing a list of all the potential organizations who were compromised by the incident mysteriously disappeared during further investigations.”</p>
<p>Both the ICAO IT supervisor in charge of the mishandled internal investigation and the ICAO’s secretary general who shelved recommendations to investigate the IT supervisor and his four team members, were both found by CrowdStrike to have ties to China’s aviation industry, CrowdStrike says.</p>
<h3><strong>Takeaways from four years later</strong></h3>
<p>This article is just a snippet of CrowdStrike&#8217;s reporting and what Turbine Panda and other associated groups are alleged to have done to help boost the Chinese aviation sector. But more than that, it tells the tale of how advanced persistent threat (APT) groups and other sophisticated threat actors will go to extraordinary means to accomplish their end goals.</p>
<p>That includes advanced hacking techniques, leveraging insiders, physical theft and collaborating with the massive underground cybercrime community to launch multi-faceted attacks against a particular organization or industry.</p>
<p>The post <a href="https://mytechdecisions.com/network-security/the-cyberattacks-and-insider-threats-during-the-development-of-chinas-c919-passenger-jet/">The Cyberattacks and Insider Threats During The Development of China&#8217;s C919 Passenger Jet</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/the-cyberattacks-and-insider-threats-during-the-development-of-chinas-c919-passenger-jet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FTC Accuses Ring of Watching Private Videos, Poor Security Practices</title>
		<link>https://mytechdecisions.com/physical-security/ftc-accuses-ring-of-watching-private-videos-poor-security-practices/</link>
					<comments>https://mytechdecisions.com/physical-security/ftc-accuses-ring-of-watching-private-videos-poor-security-practices/#respond</comments>
		
		<dc:creator><![CDATA[Jason Knott]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 17:29:37 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Ring]]></category>
		<category><![CDATA[Surveillance camera]]></category>
		<category><![CDATA[Video Surveillance Technology]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48658</guid>

					<description><![CDATA[<p>The Federal Trade Commission (FTC) has charged Ring with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos. While the FTC only mentions consumer customers, Ring does offer commercial security [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/physical-security/ftc-accuses-ring-of-watching-private-videos-poor-security-practices/">FTC Accuses Ring of Watching Private Videos, Poor Security Practices</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Federal Trade Commission (FTC) has charged Ring with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos.</p>
<p>While the FTC only mentions consumer customers, Ring does offer commercial security solutions under its Ring for Business arm. In addition, the allegations in the FTC&#8217;s complaint further demonstrate the risks that many IT and security professionals say are <a href="https://mytechdecisions.com/?s=IoT+security" target="_blank" rel="noopener">inherent in IoT devices. </a></p>
<p>Under <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/proposed_stipulated_order_ring.pdf" target="_blank" rel="noopener">a proposed order</a>, which must be approved by a federal court before it can go into effect, Ring will be required to delete data products such as data, models, and algorithms derived from videos it unlawfully reviewed. It also will be required to implement a privacy and security program with novel safeguards on human review of videos as well as other stringent security controls, such as multi-factor authentication for both employee and customer accounts.</p>
<p>“Ring’s disregard for privacy and security exposed consumers to spying and harassment,” said Samuel Levine, Director of the FTC’s Bureau of Consumer Protection. “The FTC’s order makes clear that putting profit over privacy doesn’t pay.”</p>
<p>California-based Ring LLC, which was purchased by <a href="https://www.cepro.com/tag/amazon/" target="_blank" rel="noopener">Amazon</a> (Nasdaq: <a href="https://finance.yahoo.com/quote/AMZN?p=AMZN&amp;.tsrc=fin-srch">AMZN</a>) in February 2018. According to My TechDecisions&#8217; sister-site <a href="https://www.cepro.com/cepro-100/2023-ce-pro-100-brand-analysis-high-end-brands-perform-well/" target="_blank" rel="noopener">CE Pro&#8217;s 2023 100 Brand Analysis,</a> Ring is the No. 1 video doorbell product installed by integrators with 66% of leading integrators installing the solution.</p>
<blockquote><p><strong>“Ring’s disregard for privacy and security exposed consumers to spying and harassment.”</strong></p>
<p>— Samuel Levine, Director of FTC’s Bureau of Consumer Protection</p></blockquote>
<p>In a <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/complaint_ring.pdf" target="_blank" rel="noopener">complaint</a>, the FTC says Ring deceived its customers by failing to restrict employees’ and contractors’ access to its customers’ videos, using customer videos to train algorithms, among other purposes, without consent, and failing to implement security safeguards.</p>
<p>According to the complaint, these failures amounted to egregious violations of users’ privacy. For example, one employee over several months viewed thousands of video recordings belonging to female users of Ring cameras that surveilled intimate spaces in their homes such as their bathrooms or bedrooms. The employee wasn’t stopped until another employee discovered the misconduct. Even after Ring imposed restrictions on who could access customers’ videos, the company wasn’t able to determine how many other employees inappropriately accessed private videos because Ring failed to implement basic measures to monitor and detect employees’ video access.</p>
<p>The FTC also said Ring failed to take any steps until January 2018 to adequately notify customers or obtain their consent for extensive human review of customers’ private video recordings for various purposes, including training algorithms. Ring buried information in its Terms of Service and Privacy Policy, claiming it had a right to use recordings obtained in connection with its services for “product improvement and development,” according to the complaint.</p>
<h3>Ring’s Alleged Security Failures</h3>
<p>According to the complaint, Ring also failed to implement standard security measures to protect consumers’ information from two well-known online threats—“credential stuffing” and “brute force” attacks—despite warnings from employees, outside security researchers and media reports. Credential stuffing involves the use of credentials, such as usernames and passwords, obtained from a consumer’s breached account to gain access to a consumer’s other accounts. In a brute force attack, a bad actor uses an automated process of password guessing—for example, by cycling through breached credentials or entering well-known passwords—hundreds or thousands of times to gain access to an account.</p>
<p>Despite experiencing multiple credential-stuffing attacks in 2017 and 2018, Ring failed, according to the complaint, to implement common tactics—such as multifactor authentication—until 2019. Even then, Ring’s sloppy implementation of the additional security measures hampered their effectiveness, the FTC said.</p>
<blockquote><p><strong> “The FTC’s order makes clear that putting profit over privacy doesn’t pay.”</strong></p>
<p>— SAMUEL LEVINE, FTC</p></blockquote>
<p>As a result, hackers continued to exploit account vulnerabilities to access stored videos, live video streams, and account profiles of approximately 55,000 U.S. customers, according to the complaint. Bad actors not only viewed some customers’ videos but also used Ring cameras’ two-way functionality to harass, threaten, and insult consumers—including elderly individuals and children—whose rooms were monitored by Ring cameras, and to change important device settings, the FTC said. For example, hackers taunted several children with racist slurs, sexually propositioned individuals, and threatened a family with physical harm if they didn’t pay a ransom.</p>
<p>In addition to the mandated privacy and security program, the proposed order requires Ring to pay $5.8 million, which will be used for consumer refunds. The company also will be required to delete any customer videos and face embeddings, data collected from an individual’s face, that it obtained prior to 2018, and delete any work products it derived from these videos. The proposed order also will require Ring to alert the FTC about incidents of unauthorized access or exposure of its customers’ videos and to notify consumers about the FTC’s action.</p>
<p>The Commission voted 3-0 to authorize the staff to file the complaint and stipulated final order. The FTC filed the complaint and final order in the U.S. District Court for the District of the District of Columbia.</p>
<p><em>A <a href="https://www.cepro.com/news/ftc-accuses-ring-of-illegal-surveillance-proposes-5-8m-in-refunds/" target="_blank" rel="noopener">version of this article</a> originally appeared on our sister site CE Pro. </em></p>
<p>The post <a href="https://mytechdecisions.com/physical-security/ftc-accuses-ring-of-watching-private-videos-poor-security-practices/">FTC Accuses Ring of Watching Private Videos, Poor Security Practices</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/physical-security/ftc-accuses-ring-of-watching-private-videos-poor-security-practices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Xtract One Elevates Fan Experience with SmartGateway, AI Security Screening Technology</title>
		<link>https://mytechdecisions.com/project-of-the-week/xtract-one-elevates-fan-experience-with-smartgateway-ai-security-screening-technology/</link>
					<comments>https://mytechdecisions.com/project-of-the-week/xtract-one-elevates-fan-experience-with-smartgateway-ai-security-screening-technology/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Tue, 25 Apr 2023 13:36:15 +0000</pubDate>
				<category><![CDATA[Facility]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Project of the Week]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[live events]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48062</guid>

					<description><![CDATA[<p>Xtract One Technologies, a Toronto-based threat detection and security solution that prioritizes the patron access experience by leveraging AI, announced its SmartGateway patron screening solution was selected by Simmons Bank Liberty Stadium, to secure entrances for its live events. The stadium, home of the Memphis Showboats and Tigers football team, is a 58,000-capacity stadium in Memphis, [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/project-of-the-week/xtract-one-elevates-fan-experience-with-smartgateway-ai-security-screening-technology/">Xtract One Elevates Fan Experience with SmartGateway, AI Security Screening Technology</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://xtractone.com/" target="_blank" rel="noopener">Xtract One Technologies</a>, a Toronto-based threat detection and security solution that prioritizes the patron access experience by leveraging AI, announced its SmartGateway patron screening solution was selected by <a href="http://www.thelibertybowlstadium.com/" target="_blank" rel="noopener">Simmons Bank Liberty Stadium, </a>to secure entrances for its live events. The stadium, home of the Memphis Showboats and Tigers football team, is a 58,000-capacity stadium in Memphis, Tenn.</p>
<p>The property is owned by the City of Memphis and is managed by global sports and entertainment company <a href="https://www.oakviewgroup.com/" target="_blank" rel="noopener">Oak View Group </a>(OVG), which <a href="https://xtractone.com/2022/10/oak-view-group-partners-with-patriot-one-technologies-to-introduce-next-generation-patron-screening/" target="_blank" rel="noopener">announced a strategic partnership with Xtract One</a> in October 2022.</p>
<h3><strong>Fan Safety Ahead of USFL Season</strong></h3>
<p>“As we began preparations for the start of the USFL season, we wanted to optimize our security screening technology,” Thomas Carrier, Oak View Group’s General Manager at Simmons Bank Liberty Stadium, said in a statement.  “At the stadium and across Oak View Group, we prioritize fan safety, while simultaneously leveraging innovation to enhance the fan experience. The kickoff of the new USFL season was a logical starting point to introduce Xtract One’s SmartGateway screening solutions. It is one of many prevention strategies coming to the venue for the safety and security of fans, teams, talent and staff, which we will continue using throughout the year, including during Memphis Tigers games and for the Southern Heritage Classic and AutoZone Liberty Bowl.”</p>
<h3><strong>Xtract One SmartGateway System</strong></h3>
<p>The<a href="https://xtractone.com/products/smartgateway/" target="_blank" rel="noopener"> SmartGateway system</a> was designed for large, ticketed venues to enable high throughput, but with customizability based on the customer’s individual needs and security requirements. SmartGateway delivers fast, reliable, and accurate patron screening, replacing intimidating metal detectors. This solution unobtrusively scans patrons for guns, knives and other prohibited items as they enter the facility, using AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort.</p>
<p>“It is important for community and commercial enterprises to work on collaborative solutions that allow guests to focus on fun and togetherness and cheering on their teams,” said Mayor Jim Strickland, in a statement. “The City of Memphis, Oak View Group and Xtract One are together enhancing the safety of the fans and our community.”</p>
<p>Simmons Bank Liberty Stadium will deploy SmartGateways in two phases. Phase one, beginning April 15, will leverage SmartGateways for games of the Memphis Showboats (USFL).</p>
<p>“We are thrilled to have been chosen by Simmons Bank Liberty Stadium, Oak View Group, and the City of Memphis to implement our SmartGateway technology for the safety and security of their patrons. This partnership showcases our commitment to revolutionizing the security landscape, enhancing fan experiences, and streamlining entry processes for large-scale venues,” said Peter Evans, CEO of Xtract One, in a statement. &#8220;We look forward to continuing our work with Oak View Group, and providing advanced, unobtrusive security solutions for their growing portfolio of world-class venues.”</p>
<p>The post <a href="https://mytechdecisions.com/project-of-the-week/xtract-one-elevates-fan-experience-with-smartgateway-ai-security-screening-technology/">Xtract One Elevates Fan Experience with SmartGateway, AI Security Screening Technology</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/project-of-the-week/xtract-one-elevates-fan-experience-with-smartgateway-ai-security-screening-technology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Launches Defender for IoT Cloud-Managed Platform</title>
		<link>https://mytechdecisions.com/network-security/microsoft-defender-iot-cloud-platform/</link>
					<comments>https://mytechdecisions.com/network-security/microsoft-defender-iot-cloud-platform/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Mon, 20 Mar 2023 19:47:58 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Defender for IoT]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=47526</guid>

					<description><![CDATA[<p>Microsoft is launching the general availability of Microsoft Defender for IoT cloud-managed platform designed to let businesses connect their operational technology (OT) environment without compromising their security. According to the Redmond, Wash. tech giant, Defender for IoT helps organizations manage assets, track emerging threats and control risks across enterprise and mission-critical networks in both connected [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/microsoft-defender-iot-cloud-platform/">Microsoft Launches Defender for IoT Cloud-Managed Platform</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft is launching the general availability of Microsoft Defender for IoT cloud-managed platform designed to let businesses connect their operational technology (OT) environment without compromising their security.</p>
<p>According to the Redmond, Wash. tech giant, Defender for IoT helps organizations manage assets, track emerging threats and control risks across enterprise and mission-critical networks in both connected and air-gapped environments.</p>
<p>In a <a href="https://www.microsoft.com/en-us/security/blog/2023/03/20/leverage-cloud-powered-security-with-microsoft-defender-for-iot/">blog</a>, Microsoft says cloud-powered IoT and OT security solutions offer advantages over traditional solutions, including discovery of assets-end-to-end, detecting and responding to threats in real-time, defending against known and unknown threats, compliance reports, and workflows and integrations that leverage the cloud.</p>
<p>The solution also helps organizations solve OT security issues faster by unifying the security operations center (SOC) for both IT and OT assets, the company says.</p>
<p>“With Microsoft Defender for IoT, you can achieve faster time-to-value, improve agility and scalability, increase visibility, and strengthen the resiliency of your network and infrastructure without making significant changes,” Microsoft IoT and OT security experts write in a blog. “The Defender for IoT cloud is designed to augment your on-premises processing power while providing a source of centralized management for global security teams—raising the bar for OT defense.”</p>
<p>The company gives one scenario showing how Defender for IoT works in which a new vulnerability is published with information that could impact an organization’s OT devices, and threat actors are currently trying to exploit the bug.</p>
<p>“With Microsoft Threat Intelligence, the new CVE is ingested automatically and shared across our cloud-based security services, including Defender for IoT,” the company says.</p>
<p>Organizations can use the <a href="https://mytechdecisions.com/tag/Microsoft-Azure/">Microsoft Azure</a> Portal to monitor for the new vulnerability across all devices and sites, resulting in a faster response time to secure IoT and OT environment.</p>
<p>Other scenarios where security professionals can benefit from Defender for IoT include OT security and compliance audits, attack surface reduction consulting and tabletop exercises, the company says.</p>
<p>The Defender for IoT solution also includes a new device inventory feature that allows SOCs to manage OT devices through the Microsoft Azure Portal. The feature supports unlimited data sources, including manufacturer, type, serial number, firmware, and more, helping organizations gain a complete picture of their IoT and OT assets to address any vulnerabilities.</p>
<p>In addition, Defender for IoT integrates with Microsoft Sentinel to provide security information event management for both OT and IT environments, and the solution also shares threat data with Microsoft 365 Defender, Microsoft Defender for Cloud and other products like Splunk, IBM QRadar and ServiceNow, Microsoft says.</p>
<p>The post <a href="https://mytechdecisions.com/network-security/microsoft-defender-iot-cloud-platform/">Microsoft Launches Defender for IoT Cloud-Managed Platform</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/microsoft-defender-iot-cloud-platform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Technology Tips for Retailers During Holiday Shopping</title>
		<link>https://mytechdecisions.com/physical-security/prevent-retail-theft/</link>
					<comments>https://mytechdecisions.com/physical-security/prevent-retail-theft/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Mon, 21 Nov 2022 20:34:02 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Managed Service]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=45871</guid>

					<description><![CDATA[<p>With the holidays around the corner and Black Friday shoppers set to hit the stores this week, one managed service provider that specializes in retail security is urging retailers to leverage technology to help prevent theft. Interface Systems, a Missouri-based provider of security, managed network, communications and business intelligence solutions to distributed enterprises, says retailers [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/physical-security/prevent-retail-theft/">Security Technology Tips for Retailers During Holiday Shopping</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the holidays around the corner and Black Friday shoppers set to hit the stores this week, one managed service provider that specializes in retail security is urging retailers to <a href="https://mytechdecisions.com/category/physical-security/">leverage technology</a> to help prevent theft.</p>
<p><a href="https://interfacesystems.com/">Interface Systems</a>, a Missouri-based provider of security, managed network, communications and business intelligence solutions to distributed enterprises, says retailers should heighten their awareness of organizations retail crime, which the firm says has increased by more than 25% since last year.</p>
<p>In addition, nearly 53% of retailers reported external theft to the National Retail Federation, according to Interface Systems.</p>
<p>Sean Foley, senior vice president of customer success at the managed service provider, says the holiday season brings longer hours, a larger inventory and more crowds to stores, all of which increase risk.</p>
<p>“What should be ‘the most wonderful time of the year for both shoppers and retailers, is becoming increasingly stressful due to an increased risk of theft and violence against employees,” Foley says. “Technology solutions can offer effective deterrents for retailers who face security risks every day.”</p>
<p>Interface Systems recommends investing in digital surveillance technology to help augment loss prevention professionals, such as remote security services leveraging cameras, speakers and microphones. These solutions provide discreet, always-on surveillance without degrading the shopper experience and allow remote security professionals to identify suspicious individuals and alert in-store staff or law enforcement.</p>
<p>In addition, the managed service provider recommends retailers use motion-triggered, AI-powered cameras that can be deployed in conjunction with speakers and lighting systems that can automatically warn loiterers during non-business hours. Designed to be installed in parking lots or loading areas, these solutions can be programmed to play different audio messages based on the context and even alert remote security professionals.</p>
<p>To maximize return on investment, Interface Systems recommends integrating video surveillance and security systems with point-of-sale systems to allow for transactions to be mapped to video recordings to help retailers find instances of theft, including coupon fraud, refunds made without customers, sweethearting and unauthorized price overrides.</p>
<p>As with cybersecurity, employee training and awareness is equally important in physical security, according to Interface Systems.</p>
<p>The company recommends implementing a robust training and communications program to help keep employees and customers safe, including training for both seasonal and existing employees. Training should include role-playing scenarios, drills, and a synopsis of the security technologies deployed. An emergency communication plan should also be clear to all employees.</p>
<p>“Retailers need a comprehensive safety program to prepare and protect their associates from a variety of dangerous situations,” says Tyson John, senior vice president of security monitoring operations at the firm. “When employees know that their safety is the priority, it creates peace of mind and can boost morale and productivity.”</p>
<p>The post <a href="https://mytechdecisions.com/physical-security/prevent-retail-theft/">Security Technology Tips for Retailers During Holiday Shopping</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/physical-security/prevent-retail-theft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IoT/Connected Product Awards 2022 Announced</title>
		<link>https://mytechdecisions.com/unified-communications/iot-connected-product-awards-2022-announced/</link>
					<comments>https://mytechdecisions.com/unified-communications/iot-connected-product-awards-2022-announced/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Thu, 27 Oct 2022 20:51:39 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Unified Communications]]></category>
		<category><![CDATA[Access Control]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Unified Communications and Collaboration]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=45551</guid>

					<description><![CDATA[<p>At Total Tech Summit 2022, Jason Knott, chief content officer for Emerald&#8217;s connected brands (including TechDecisions) announced the winners of the IoT/Connected Product Awards 2022. The winners of the commercial category are as follows: Access Control: Genetec — Genetec Enclosure Management powered Cloud Link Roadrunner AV Collaboration: Biamp — Parlé VBC 2500 all-in-one conferencing bar [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/unified-communications/iot-connected-product-awards-2022-announced/">IoT/Connected Product Awards 2022 Announced</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At Total Tech Summit 2022, Jason Knott, chief content officer for Emerald&#8217;s connected brands (including TechDecisions) announced the winners of the IoT/Connected Product Awards 2022.</p>
<p>The winners of the commercial category are as follows:</p>
<ul>
<li><strong>Access Control</strong>: <a href="https://www.genetec.com/">Genetec</a> — Genetec Enclosure Management powered Cloud Link Roadrunner</li>
<li><strong>AV Collaboration</strong>: <a href="https://www.biamp.com/">Biamp</a> — Parlé VBC 2500 all-in-one conferencing bar</li>
<li><strong>Fire/Intrusion</strong>: Alula — BAT-Fire</li>
<li><strong>Video Surveillance</strong>: <a href="https://www.axis.com/en-us">Axis Communications</a> — AXIS M4308-PLE Panoramic Camera</li>
<li><strong>Miscellaneous</strong>: <a href="https://ipvideocorp.com/">IPVideo</a> — HALO IoT Smart Sensor 3C</li>
</ul>
<p>Knott also announced the IoT/Connected Product Awards winners in the resident category. They are as follows:</p>
<ul>
<li><strong>Home Enhancement</strong>: <a href="http://www.crestron.com">Crestron</a> — Crestron Home</li>
<li><strong>Lighting</strong>: <a href="http://www.crestron.com">Crestron</a> — Crestron LED Light Fixtures</li>
<li><strong>Network Communication</strong>: <a href="https://store.google.com/category/connected_home?hl=en-US">Google Nest</a> — Nest Wi-Fi Pro</li>
<li><strong>Physical Security/Access Control</strong>: <a href="https://www.doorbird.com/">Doorbird</a> — A1121</li>
<li><strong>Physical Security/Surveillance</strong>: <a href="https://store.google.com/us/product/nest_doorbell?hl=en-US">Nest Doorbell</a> (Second Generation)</li>
</ul>
<p>Total Tech Summit co-locates CE Pro Summit, Commercial Integrator Summit and Security Sales &amp; Integration Summit, all sister brands of TechDecisions. The event thus drives noteworthy progress in the custom, commercial and security integration industries.</p>
<p>Total Tech Summit 2022 is ongoing from October 26 to October 28, 2022 in Orlando, Fla. For more updates on this event, follow Twitter updates from Dan Ferrisi (<a href="https://twitter.com/DanFerrisiEdit">@DanFerrisiEdit</a>) and <em>Commercial Integrator</em> (<a href="https://twitter.com/commintegrator">@commintegrator</a>), and check out the hashtag <a href="https://twitter.com/hashtag/TotalTech22?src=hashtag_click">#TotalTech22</a>!</p>
<p><em><a href="https://www.commercialintegrator.com/">This article originally appeared in our sister publication Commercial Integrator. </a></em></p>
<p>The post <a href="https://mytechdecisions.com/unified-communications/iot-connected-product-awards-2022-announced/">IoT/Connected Product Awards 2022 Announced</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/unified-communications/iot-connected-product-awards-2022-announced/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
