CyberSecurity


Cyber Impact

Cyber Impact

Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.



CLOUD-BASED SOLUTION

Cloud-based Solution

Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.

A Child Tracker Website, uKnowKids, Admits Data Breach

Child Tracker Website, uKnowKids, Admits Data Breach

A website that contains information about children in case they go missing has admitted a glaring security hole that leaves the data of over 1,500 children exposed.

Having the best, most accessible technical support team will ensure the safety and security of not only your data and staff, but will be an added benefit to your company’s long-term bottom line, as well.

Online Exclusive: Top 4 Security Installation Mistakes to Avoid

Having the best, most accessible technical support team will ensure the safety and security of not only your data and staff, but will be an added benefit to your company’s long-term bottom line, as well.

MasterCard Unveils New ‘Selfie’ Security Check

MasterCard Unveils New ‘Selfie’ Security Check

MasterCard announced new security measures for mobile smartphones and tablets.

Apple Urges U.S. to Form Encryption Commission

Apple Urges U.S. to Form Encryption Commission

The company asked the government to create a panel to help resolve a standoff over national security.

Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Director of National Intelligence speaks about which security threats the United States should be prepared for.

Data Breach: 63,000 Social Security Numbers Compromised at University

Data Breach: 63,000 Social Security Numbers Compromised at University

The University of Central Florida is investigating a data breach that left 63,000 Social Security numbers vulnerable.

DropBox, Gmail Logins Acquired in Security Camera Hack

DropBox, Gmail Logins Acquired in Security Camera Hack

Researchers find the Motorola Focus 73 security camera to have a pretty big vulnerability.

Is your Bank Teller your Biggest Threat?

Is your Bank Teller your Biggest Threat?

Bank robbers aren’t the only ones that will demand cash from your accounts.

Facebook Bans Private Gun Sales on Its Site

Facebook Bans Private Gun Sales on Its Site

Facebook announces they will be banning private gun sales on its site, a move meant to clamp down on unlicensed gun transactions.

Where Video Data Will Take Us - Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

Where Video Data Will Take Us

Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

It

It's All About the Network

The daily increase in the number of cyber attacks launched and the success hackers are having against heavily guarded businesses are a wake-up call for all companies to be more proactive and vigilant in their security efforts.

Top Fraud Risks for Financial Institutions in 2016

5 Top Fraud Risks for Financial Institutions in 2016

All in all, cyberattacks will continue to menace financial institutions in 2016.

3 Strategies for Ensuring Your Payment Platforms Are Secure

Online Exclusive: 3 Strategies for Ensuring Your Payment Platforms Are Secure

Consumers may think data breaches are inevitable, but if a business can show them that such risks are avoidable, it’s sure to profit. Don’t get left behind by your competitors—invest in a robust payment-protection platform before it’s too late.

Hackers could be Secretly Tapping into your Corporate Meetings

Hackers could be Secretly Tapping into your Corporate Meetings

Lots of companies, even the White House, use a conference calling system that could possibly be tapped by hackers, according to new research.

Your Smartwatch Could Be your Biggest Security Threat

Your Smartwatch Could Be Your Biggest Security Threat

A student discovered that wearable technology could lead to stolen ATM pin codes.

Security Flaw Found in New “Must-Have” Star Wars Toy

Security Flaw Found in New “Must-Have” Star Wars Toy

A security research company has found easy it is to bring BB-8 to the dark side.

Websites and Apps Have One Year to Adhere to New Security Measures

Websites and apps have been given the deadline of January 1, 2017 to adhere to new security standards to minimize the risk of hacking and prevent a “mini-Y2K,” or have access to their websites taken away.

Worst Data Breaches of 2015

Worst Data Breaches of 2015

It seems all we read about in 2015 was data breaches, data breaches and more data breaches.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities