How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

He writes that any network node left unprotected… well, you can read about it in the cover story, but get it in your mind that if you’re doing this, you’re at risk. Threats abound in the networking world; first and foremost, you must harden your connections.

There are so many new technologies available today, and most are on the same network structure. This is probably not a good idea, and besides, it puts undue burdens on the IT staff to pay attention to cyber security.

Ricco makes a compelling argument of strategies for protecting network ports. He says it’s important to protect yourself, pay particular attention to the user/administrator credential management, physical port security, and video and data flow protection.

Our other editorial contributors, such as Julie Olenski, write about locking the obvious front door to your network and what digital defenses might work best for you. Madeline Domma writes about building a foundation as part of a vulnerability management plan. I’m sure you know and understand that problems can emerge without a proper plan.

While it seems that physical security depends upon the IT infrastructure, the reverse also is true. It makes a lot of sense for everyone to pull together in their commitment of the security infrastructure.

This article originally appeared in the May 2015 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

  • The Core Value Proposition

    The Core Value Proposition

    Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go. Read Now

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

Featured Cybersecurity

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • D-Tools System Integrator (SI) Software

    D-Tools System Integrator (SI) Software

    D-Tools Inc. has announced the availability of System Integrator version 16, which adds powerful new project and service management capabilities to its award-winning, end-to-end business management solution. 3