Decoding Data Privacy Regulations

There are three types of organizations: Those who have been hacked; those who are doing everything in their power to not be hacked; and those who are being hacked right now, without even knowing it. This is the reality we now live in, made evident by the endless stream of news stories about large-scale data breaches affecting companies, big and small, across nearly every industry. But this doesn’t just affect the private sector—the federal government is facing similar challenges and taking action to both prevent and deter cyber-attacks through legislation.

With these escalating cyber threats affecting the United States Government, compromised devices, servers, data, and user accounts have quickly become definite risks to our national security. In the face of this ever-evolving landscape, both federal and state governments are taking action to better safeguard both Department of Defense (DoD) and consumer data. If this sounds complex, you’re not alone; but it’s easier to decode than you might think.

Data Privacy Decoded

In response to these threats, U.S. congress has amended the National Defense Authorization Act (NDAA) by signing into law the John S. McCain NDAA, outlining both budgets and expenditures for DoD programs. This includes the Chinese hardware ban, placed into effect in August of 2019, barring all government agencies from buying, or even contracting to buy, video surveillance equipment from specified manufacturers. This also extends to vendors that have OEM, ODM, and JDM relationships—or those who utilize “essential components” and “crucial technology” from those companies.

These new regulations, including the prominent Defense Federal Acquisition and Regulation Supplement (DFARS), will now require all outside contractors to provide “adequate security” measures for defense information that is processed, stored, or transmitted on the contractor’s internal information system or network. But it isn’t just the federal government stepping in, individual states have begun to enact their own regulations to better safeguard their citizens as well, like the California Consumer Privacy Act (CCPA). All this to say, there is no escaping the changes posed by these new digital hazards.

What does this mean for the physical security industry? This not only points to cybersecurity becoming a mainstay consideration for end users; it also means manufacturers and integrators will be held to a higher standard. While deficient cybersecurity standards reflect poorly on integrators, they can also make them complicit in any issues that may arise in the future. For example, in 2018 ADT was forced to settle a $16 million class action lawsuit when the company installed wireless systems that left users open to hacks.

Evaluating Your Risks

Surveillance solutions are collecting unprecedented amounts of data, with the ability to track everything from facial expressions to body characteristics, behavior, actions, location, and more. While the technology itself isn’t posing an issue, the way it’s used can easily become one. Foreign entities and hackers alike are increasingly exploiting security devices to gain access to private systems. No matter your industry, there are organizations around the world interested in obtaining data from your network to manipulate information that can impact your business and consumers.

With the proliferation of Internet of Things (IoT)-enabled devices, there is no doubt that physical security systems have become more intelligent than ever before, but this doesn’t come without some drawbacks. While they may be smart, IoT devices are often considered “soft” targets that cybercriminals can make use of to cripple a physical security system from the inside out. These interconnected systems can only be as strong as their weakest link, making data protection measures key.

While data breaches, ransomware, and hacks are the usual concerns, many organizations also overlook the physical danger presented by weak cybersecurity practices. Large organizations that utilize surveillance devices alongside advanced analytics programs often leave themselves open to a physical attack without realizing it. By paralyzing a physical security system remotely, intruders can then enter facilities undetected, putting workers and assets in harm’s way.

Protecting Yourself

As a starting point, knowing where your video surveillance system comes from is crucial. With named foreign governments utilizing video surveillance technology to spy on their own citizens, the question must be asked: Where is your security system manufactured?

Decentralized technology is another important factor to consider. This basic concept ensures data collection and analytics are completely self-managing and inherently protected from a system-wide breach. Simply put, this means the surveillance system itself has minimized the points of access for hackers.

Technology aside, there are also some best practices that both integrators and end users can employ to help secure their surveillance systems. Keeping camera firmware up to date, always changing default passwords, and creating user groups with separate rights to ensure they only have the access they need are all simple ways for end users to keep up their cyber hygiene. Additionally, setting encryption keys for surveillance recordings can safeguard footage and prevent hackers from accessing the system through a backdoor.

Similarly, integrators should always advise end users to program and enable notifications in order to keep up-to-date with all system happenings, and to check their web server log on a regular basis to see who is accessing the system. Configuring a virtual private network (VPN) connection can also aid in secured remote access.

In this new era of data privacy regulations, it truly takes a village. End users will need to demand devices and software with cyber-protections built in; manufacturers must place a higher priority upon cybersecurity; and integrators will have to be more informed about the technology they choose to install.

Looking toward the future, these changes may seem daunting, but they are intended to bring about a new world of possibilities for the industry. Integrators that ease their client’s cyber-woes will be a step ahead of the pack. By choosing to work with cyber-focused manufacturers who prioritize device penetrating testing, encryption, and best practices, integrators can quickly gain a competitive advantage.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3