CyberSecurity


Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

A new investigation discovered that the medical images and health data of more than 5 million patients in the U.S. was readily accessible on the web without a password or login.



Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Hackers are targeting IT service providers as a means of attacking dozens of organizations at once and potentially reaping bigger financial rewards.

Treasury Department Implements Sanctions on North Korean Cyber Groups

Treasury Department Implements Sanctions on North Korean Cyber Groups

The department announced the sanctions Friday after it said that North Korean intelligence groups targeted American critical infrastructure, particularly the financial system.

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Lawmakers are working to find a solution that will help counter ransomware attacks, which are affecting school districts and municipal governments.

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google is working to keep unwanted and malicious content from its users.

Stanley Security GSX booth 2019

Live from GSX 2019: Day 1

Security management systems for businesses large and small were the talk of GSX exhibitors.

5 Common Phishing Attacks and How To Protect Yourself Against Them

5 Common Phishing Attacks and How To Protect Yourself Against Them

Phishing scams continues to be a widespread problem for businesses and individuals alike. But there are several ways to recognize that you could be getting scammed.

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Facing criticism over low voter turnout and barriers to caucusing, party officials planned for remote caucuses in 2020. But the national Democratic Party said the methods would expose the process to high cybersecurity risks.

3 Major Internet Privacy Issues and How to Avoid Them

3 Major Internet Privacy Issues and How to Avoid Them

Information mishandling, snooping and location tracking are often the ways in which users find their privacy violated online.

Deploying IoT Devices

Deploying IoT Devices

The number and breadth of devices that make up the Internet of Things (IoT) continues to grow rapidly, with everything from kitchen appliances to video surveillance and access control systems offering the ability to connect to a network.

Security by Design

Security by Design

We know by now that there is an abundance of business advantages in the cloud — it’s agile and cost-efficient, and, with little to no hardware maintenance, it’s easier to update and perform maintenance on than traditional on-site servers.

5 Questions for Your Cloud Provider

5 Questions for Your Cloud Provider

Do you want the real bottom line in providing cloud services for video, access control and other integrated services?

Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.

voting booth in 2016

Government Officials Worry That Ransomware Attacks Could Derail 2020 Elections

The Department of Homeland Security is preparing to launch an education program on the potential of ransomware attacks targeting voter databases, some of which were compromised by Russian hackers in 2016.

cyber attack written on newspaper

Report: Insurance Companies Are Exacerbating Rise in Ransomware Attacks

A ProPublica investigation found that the decision by insurers to pay hackers instead of encouraging victims to recover files by themselves is helping fuel a surge in ransomware.

department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

department of justice

Justice Department Indicts 80 People in Massive Online Fraud and Money Laundering Scheme

Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.

laptop cybersecurity

Five Surprising Trends in Cybersecurity

The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.

medical devices

Healthcare Industry Facing Growing Range of Cyber Threats From Hackers, Foreign Countries

A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3