Good Advice – Wash Your Cyber Hands!  Even Better – Do It Remotely!!

    [fa icon="calendar'] Apr 28, 2020 3:31:40 PM / by John Gallagher posted in cyber, IoT, firmware, cloud, compliance, remote

    [fa icon="comment"] 0 Comments

    We are on the verge of a crisis in Cyber Hygiene.  Not only are millions of IoT devices (like physical security cameras) unprotected and vulnerable, the methods to harden and protect them (sustainable cyber hygiene) have often been done manually and require physical presence onsite.  Automated solutions like Viakoo can help change this dynamic. 

    Read More [fa icon="long-arrow-right"]

    Enterprises Sit on a Time Bomb

    [fa icon="calendar'] Apr 6, 2020 8:41:12 PM / by Mark McCourt posted in cyber, physical security, IoT

    [fa icon="comment"] 0 Comments

    The Security Industry Association's Primer: Minimize Risk by Protecting Privacy is an important first step in changing the profile of physical security solutions from having significant cyber vulnerabilities to being trustworthy.

    The recommendations published are the association's (and perhaps the industry's) effort at having manufacturers build component-level cyber features within their products.

    This is critical as enterprise customer RFPs are starting to require physical security products be trustworthy. Further, they are demanding transparency documenting cyber hygiene for passwords and firmware.

    Specific to the physical security market, a recent study by Palo Alto Networks' Unit 32 found that while security cameras account for only 5% of IoT devices, they represent 33% of the cyber risk, concluding "the general posture of IoT devices is declining."

    Since IoT devices are not IT devices, IT tools do not work to secure them. Uniquely, Viakoo's Cyber Hygiene Suite is an OT or operational technology solution providing customers enterprise-wide cyber solutions for physical security and broader IoT applications at scale.

    To learn more about this important issue write info@viakoo.com, or visit https://www.viakoo.com/cybersecurity-solutions-physical-security/

    Read More [fa icon="long-arrow-right"]

    Edge Data Centers Drive Changes in Physical Security

    [fa icon="calendar'] Feb 12, 2020 4:45:00 PM / by John Gallagher posted in big data, cyber, physical security

    [fa icon="comment"] 0 Comments

    According to a recent report from the research firm IDC entitled Data Age 2025, more than 33 zettabytes of data were generated in 2018. (A zettabyte is one sextillion bytes – or 1000 to the 7th power) Within seven years IDC predicts that number will explode to an incredible 175 zettabytes, with more than 30 percent of that data requiring real-time processing. Where will all this data be held, processed, and stored?

    Read More [fa icon="long-arrow-right"]

    How to Get Physical with Cybersecurity

    [fa icon="calendar'] Oct 29, 2019 6:04:01 PM / by John Gallagher posted in cyber, physical security, IT, IoT

    [fa icon="comment"] 0 Comments

    Earlier this summer the Center for Cyber and Homeland Security (CCHS) at Auburn University in conjunction with the International Security Management Association (ISMA) released a new survey that reflected how the C-suite views the evolving roles of cyber and physical security risks and mitigation strategies within their organizations. As October is National Cybersecurity Awareness Month, the timely findings of the research highlight the fact there has been a seismic shift in how organizations approach the relationship between the cyber and physical security threats they face.

    Read More [fa icon="long-arrow-right"]

    The Need for Compliance as a Service for Physical Security

    [fa icon="calendar'] Oct 15, 2019 3:30:50 PM / by John Gallagher posted in benchmarking, cyber, service assurance, compliance

    [fa icon="comment"] 0 Comments

    Physical security systems can be managed and operated in a variety of ways – some methods lead to flawless operation, and some lead to quite the opposite.  But when having an operational physical security system is critical – for life safety, business impact of a failure, or other unacceptable outcomes – then it becomes important to know that the system is in fact operating exactly as it should.  This is the domain of compliance. 

    Read More [fa icon="long-arrow-right"]

    Viakoo Solutions Harden and Support Cloud-Based Physical Security Services

    [fa icon="calendar'] Jul 16, 2019 6:54:09 PM / by John Gallagher posted in cyber, service assurance, cloud

    [fa icon="comment"] 0 Comments

    Many organizations are implementing, or have already implemented, cloud-based physical security services to supplement or replace instances of on-premises software and processing. The trend to make everything into “as-a-Service” has brought us popular cloud services including CRM systems such as Salesforce, communication systems such as GoToMeeting, and shared storage such as Box. Security systems “as-a-Service” are also rapidly growing, including cloud-based identity management, access control, and video surveillance, among others. With more than 20,000 cloud services available, consumers and businesses alike have quickly become accustomed to their advantages, including greatly improved access from any connected location, and greatly improved collaboration with other contributors.

    Read More [fa icon="long-arrow-right"]

    How Viakoo Can Make Elections Secure Again

    [fa icon="calendar'] May 28, 2019 3:41:05 PM / by John Gallagher posted in cyber, physical security, service assurance

    [fa icon="comment"] 0 Comments

    This past Thursday evening Viakoo participated in a great event hosted by CapitolSec 2020 in Sacramento – a “pitchfest” where multiple technology companies came to share ideas in front of a judging panel on how their technology could be used to improve the security of election systems.  While we’re proud that we were awarded as the winner based on having the most compelling technology solution to this problem, the more important takeaway is that solutions for IoT service assurance and cyber hygiene are needed for broad societal issues, not just commercial or industrial applications. 

    Read More [fa icon="long-arrow-right"]

    Digital Twins – Secure Enough For Security?

    [fa icon="calendar'] May 7, 2019 7:19:59 PM / by John Gallagher posted in cyber, physical security, IoT, service assurance

    [fa icon="comment"] 0 Comments

    Because they model a part of the real world, “digital twins” are quickly becoming important business tools for organizations that deploy Internet of things (IoT) devices. Digital twins can help maintain industrial processes, explore new business opportunities, and develop new and enhanced connected products and services. They are particularly applicable to distributed systems such as physical security systems that include many IoT devices, where they can help solve operational issues more quickly and effectively than field diagnostics.

    Read More [fa icon="long-arrow-right"]

    Convergence is Back with a Vengeance

    [fa icon="calendar'] Mar 20, 2019 4:25:00 PM / by John Gallagher posted in cyber, physical security, IoT, firmware

    [fa icon="comment"] 0 Comments

    A few years ago at physical security industry conferences the word I heard the most was “convergence”. At that time the meaning of it was how Physical Security and IT were coming closer together, and it was a hot topic because analog technology was quickly giving way to IP-based approaches. With access control becoming tied to identity management, and surveillance being managed, stored, and analyzed on computer networks, it’s easy to see now why that convergence was critical for the industry and one that required rethinking old approaches.

    Read More [fa icon="long-arrow-right"]

    How Service Assurance Can Help Meet GDPR Goals

    [fa icon="calendar'] Jan 22, 2019 2:28:06 PM / by John Gallagher posted in cyber, service assurance, GDPR

    [fa icon="comment"] 0 Comments

    The European General Data Protection Regulations (GDPR) have been in effect for some time now – since May 2018 – and they have already had some significant impacts on how companies around the globe collect, store, and manage data that includes personal information. In  fact, the first penalty levied against an organization for non-compliance to GDPR was for video surveillance violations. Many companies that are affected by these regulations have implemented specific compliance objectives to stay ahead of requirements, which include both organizational and technical safeguards to protect the specified data.

    Read More [fa icon="long-arrow-right"]