IT Security


Survey: Mobile Devices, Remote Computing Posing New Security Challenges

Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.

Scientists Find Method To Automatically Detect Internet Worms

Scientists may have found a new way to combat the most dangerous form of computer virus. The method automatically detects within minutes when an Internet worm has infected a computer network. Network administrators can then isolate infected machines and hold them in quarantine for repairs.

Two-Factor Authentication Solution Provides Access To Fully Encrypted Disks

Gemalto and McAfee recently introduced a new integrated solution that enables PC and laptop users secure and convenient access to fully encrypted disks through strong, secure, hardware-based, two factor authentication.

Study: Risky Online Behavior More Likely To Happen At Small Companies

Trend Micro recently reported that in the U.S., U.K., Germany and Japan, employees in small companies took more online risks while on the company network compared to their counterparts in larger organizations, according to the results of a study that explores corporate computer users' perceptions of and experiences with security threats.

Breach In Delivery

To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are

The Data Defenders

Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.

Majority Of IT Directors Believe Insiders Pose Bigger Risk To Security According To Survey

Secure Computing Corp. recently announced the results of an IT director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for emerging Web-based attacks.

Survey Finds 45 Percent Of Businesses More Concerned About Data Breaches

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an alarming “air of invincibility” when it comes to their companies’ potential exposure to a data breach



Study: Outbound E-Mail Remains Greatest Source Of Risk For Enterprises

In its fifth-annual study of outbound e-mail and content security issues, Proofpoint Inc. found that large enterprises continue to incur risk from -- and take action against -- information leaks over outbound e-mail, as well as newer communications media such as blogs, message boards, media sharing sites and mobile devices.

Survey: Orphaned Accounts Remain Problem For Organizations

Symark International recently announced the results of a survey of more than 850 security, IT, HR and C-level executives across all industries. Conducted by eMediaUSA, the survey focused on orphaned accounts -- user accounts that remain active after an employee has left a company -- and the processes organizations have in place to locate and terminate them.

Report: Web-Based Malware Increases In April

In its Global Threat Report issued recently, ScanSafe reported a 35 percent increase in Web-based malware in April.

Survey: Majority Of IT Professionals Concerned About Compliance With Specific Mandates

A new survey of IT professionals revealed that new regulatory compliance requirements -- for implementing satisfactory technology solutions to address security vulnerabilities, data leakage and compliance -- remain difficult for enterprise organizations to effectively achieve.

Simple Security Questions

It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.

Study: Competition Set To Drive Network Access Control Market

Network access control technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common misperceptions are dispelled and NAC gains acceptance as a key part of network security, these technologies become the center of a highly competitive and lucrative market.

Rise of the Digital Certificates

Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?

Scram, Spam

Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.

Technology Detects, Blocks Cell Phone Usage In Sensitive Areas

AirPatrol Corp. recently launched a cell phone detection and location solution to help businesses and governments protect against the unique threats posed by the use of cell phones for fraud, crime and interference with business operations.

Study: Worries Regarding Corporate Reputation Making Information Security Top Priority Worldwide

Avoiding reputation damage to the organization was viewed as a top priority for security programs by three-quarters of information security professionals surveyed in a worldwide study launched recently by (ISC)².

Survey: Access Is Top IT Security Concern In Healthcare

According to a survey conducted at the HIMSS 2008 Annual Conference and Exhibition, 64 percent of respondents cited “access” as their number one IT security concern, highlighting the importance of controlling user access to clinical systems and applications in healthcare environments.

Stop An IP Camera Hack

How’s this for a nightmare scenario? Stealthy bad hats sneak up on an IP video camera attached to a remote fence and unplug it from its Ethernet cable. In its place, they jack in a laptop computer and -- voila! -- they’re now inside that surveillance network where they can manipulate other cameras, reprogram door locks, fiddle with access credentials and perhaps wreak havoc all over the target organization’s intranet.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.