securitylinkindia

MassMediaLink India LLP SecurityLink India

Hikvision & SGS Sign Memorandum for Joint Lab Collaboration

Hikvision, the world’s leading supplier of video surveillance products and solutions, and SGS, the world’s leading inspection, verification, testing, and certification company, have recently announced that they have signed an agreement for joint laboratory collaboration. The memorandum will pave the way for joint efforts in testing, inspection, verification and certification of Hikvision products. It will also see the two companies cooperating strategically in various areas including mutual technology exchange, training, information sharing and platform establishment. As a true manufacturer, product quality is of the utmost importance for Hikvision. Over the past few years, the company has stringently conducted testing processes on every product series and closely collaborated with SGS to optimize procedures. The joint laboratory marks the deepened collaboration between the both parties. With the expertise and knowledge of SGS, Hikvision aims to improve its product testing efficiency and capability to a new height, further responding to industry demands and satisfying customer needs. “SGS actively participates in the formulation of global standards and regulations. It has deep understanding and insight in these fields and the global market trend. We rely on our professional technical team and their rich experience who will assist Hikvision in the improvement of their product quality and competitiveness in the security market,” said Laurence Kwan, Director for Electrical and Electronic Business at SGS Asia-Pacific. SGS is the world’s leading inspection, verification, testing, and certification company. With more than 90,000 employees, SGS operates a network of over 2,000 offices and laboratories around the world. SGS-CSTC Standards Technical Services Co. Ltd. was founded in 1991 as a joint venture between SGS Group and China Standard Science and Technology Group.

Read More

BSIA Saddened by Manchester Terror Attack, Praised Private Security Personnel

The British Security Industry Association has issued a statement in reaction to the terrorist attack that took place in Manchester, on 22 May 2017. “We at the BSIA were saddened to hear of the recent horrific terrorist attack in Manchester, and would like to praise the quick actions of the private security personnel, who would have been among the first to respond to this incident, placing themselves at considerable risk in doing so. “In times of emergency and in day-to-day operations, private security personnel provide essential support to local police forces, and are often the ‘unsung heroes’ helping to ensure the continued safety and security of the British public. “Their ability to provide this vital service is thanks to the mandatory training they receive as part of our industry’s important licensing and regulatory regime, which plays a crucial role in making sure that private security personnel have the necessary skills and knowledge to support police and emergency services through even the most challenging situations. “Of course, our thoughts go out to the victims, their families and the city of Manchester at this difficult time.”

Read More

Two Things to Demand from the Access Control Provider

In today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service. In the security industry, one solution in high demand is the use of mobile apps for critical functions such as credentialing, remote operations and alerts. Mobile credentialing frees the user from having to carry physical credentials such as tokens or ID badges. Further, mobile access control solutions are well-suited to applications that experience numerous spontaneous events such as lockdowns or weather related emergencies, or with a frequent need to activate/ de-activate access card holders. Key points include: Security: Security has always been a fundamental part of mobile operating systems, and the encrypted security of smart credentials and/ or door management apps makes them more secure and difficult to counterfeit. Mobile devices often require multifactor authentication while traditional access control devices do not. Convenience: Mobile users can control their facilities and access timely information from wherever they are. This is important for emergency situations, and convenient for other scenarios such as activating or deactivating credentials. Mobile credentialing provides, even more, convenience, with new readers that can accept both proximity cards and mobile credentials speeding the transition to mobile technology. Increased integration: With mobile technology, one credential allows access to doors, data and cloud applications, with security and tracking incorporated into every user action. This high-level integration can also be used to trigger automated tasks like time and attendance recording. Cost: Maintaining a physical and logical access control system with disparate applications can be costly, particularly when updates are implemented and integration must be performed across all systems. A physical access control system with mobile credentialing can be easily upgraded to add logical access control for network log-on. For card-based credentialing, material costs must be considered as well; digital credentials have no material cost. Still, users may not get the most out of their system if the provider does not have a customer-focused culture. At a minimum, providers should offer flexibility, post-sales support, availability, expertise and training. Flexibility: Recognizing that off-the-shelf solutions are hardly sufficient for addressing the specific requirements of every installation, customer-focused providers are willing and able to accommodate customization. Post-sales support/ training: The reality of access control systems is that – like any solution – they require ongoing service, support, and training to provide customers with the continuous, reliable operation they need. One true measure of a vendor is what they can – and will – do to address and accurately fix any issues in a timely manner. Post sales training is also key to assuring the customer knows how to best manage their system in multiple languages. Availability: In today’s connected world, customers have a wide variety of ways to contact a provider, all of which are irrelevant if they can’t actually connect with the vendor. Delays compromise security, so customers deserve a specific person they can rely on when they need help the most, often when something goes wrong and requires immediate attention. Expertise: The expertise and experience of customer-focused organizations can help end users make better and more confident decisions about an access control installation. When combined, customer service and mobile technology offer tremendous potential for maintaining the safety and security of people, places, and assets. Your chosen provider should be able to deliver to you the latest in mobile technology plus a commitment to the best possible customer service. Robert Laughlin, President, Galaxy Control Systems

Read More

Distributed Cybercrime Attack the World

Ransomware and banking Trojans dominate the cybercrime mainstream today, and their technical operations are heavily analyzed. But little attention has been given to the business model which plays a large role in dictating their behavior, targets, and tactics. A revolutionary concept in cyber crime is what I call ‘distributed cybercrime,’ a business model in which cyber criminals attack many victims in the same campaign. Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and has already dominated the threat landscape. Improved ROI and the support of a newly erected ‘dark industry’ has made distributed cyber crime the hottest trend in cybercrime. Most of the professional cyber criminal groups today develop malware with a distributed business model, then use professional platforms, distribution services, and infection experts to attack the world. They don’t know who their victims are nor do they care. They’re not looking to get points on style. They’re just businessmen who built the perfect, automated money-making machine. 6 Reasons why cybercriminals love the new business model Beginning in 2006, innovations in malware, banking Trojans and ransomware created a new type of business model for cybercriminals: rather than concentrating all their efforts on penetrating high-quality targets, they can steal small amounts of money from numerous victims. The business model of distributed cyber crime has made some attackers multi-millionaires in a short amount of time due to its many business benefits: 1.    Attacks require less effort as they target ‘low-hanging fruit’ (i.e., individuals or organizations with sub-par security). 2.    Attack skill level is low compared to techniques such as spear-phishing – regular ol’ phishing is good enough for weak targets. 3.    Highly coveted zero-day vulnerabilities are no longer required for profitable attacks – mainstream CVE vulnerabilities with known exploits and existing patches will do, as many victims don’t patch regularly. 4.    Any standard endpoint is a potential source of revenue, making a lateral movement toward the crown jewels irrelevant. 5.    When you attack the world, the sky is the limit – the amount of potential revenues is endless. 6.    Less effort and more profit mean better ROI. Mass distribution, victim profiling, and outsourcing The new business model presented new challenges for cyber criminals. If you want to become filthy rich through distributed cybercrime, you can’t just attack 100 victims – you need to attack hundreds of thousands of victims. This drove professional cybercriminals to build mass-distribution platforms to spread their malware and automated-infection systems to exploit victims’ machines and run the malware. But the quantity of traffic is not enough. Victims must fit a desirable profile. Cyber criminals want to avoid targeting low-income victims with ransomware as they’re probably less able to pay the ransom, and the ransomware’s language should match the victims’ language to ensure instructions on purchasing bitcoin and paying the ransom are understood. Mass distribution experts and traffic dealers offer their shady customers this very type of targeted services. In addition to victim-specific traffic, infection services are also up for sale (or more commonly, for rent). Rather than coming up with new or unique exploits, pre-packaged exploit kits are readily available to launch the attack of your choosing. These kits supply the distribution and traffic services mentioned above, to use the best exploits available to infect victims’ machines and, if successful, run the customer’s malware. The exploit kit method essentially outsources distribution and infection to reliable, high-quality service providers at an affordable price. Where have all the targeted attackers gone? You may ask yourself: what happened to targeted attacks? The answer: absolutely nothing (and thank you for asking). In fact, targeted attacks today are easier than ever, as demonstrated by cyber attackers who do care about the identity of their victims (like nation-states). Targeted attacks did not disappear – they’ve only been eclipsed by the attractiveness of the ROI of distributed attacks. Only when the profitability of targeted attacks can compete with the distributed cybercrime business model will we see their rise to prevalence again. There are initial signs that cybercriminals are testing targeted attacks with malware more commonly used for distributed attacks, as evidenced by recent ransomware attacks on high-quality targets such as hospitals and hotels. The problem comes back to ROI: while cyber criminals demanded up to $5M ransom from one victim, the highest ransom paid by a single victim (as far as we know) was a meager $28K. The next big thing What’s next for the innovative cybercriminal? My Prediction: a hybrid business model with tailored ransom pricing. Imagine a mass-distribution platform doling out ransomware on a global scale that, when executed, will assess the victim’s environment. If that environment is a consumer’s machine, the calculated ransom will be relatively low; if it’s an enterprise network, considerably higher; if it’s critical infrastructure, astronomical. Whatever the next big thing is in cyber crime, you can be sure it will be driven by ROI – nothing dictates the dark industry more than these three simple letters. Tal Sheffer, CTO, Skybox Security

Read More

The Benefits of Safe Cities

Safer Cities Creating a Better Life For the first time in history, there are more people around the world living in cities than people in rural areas. While the global migration to urban areas is improving their living standards, health, and financial prosperity, it also brings challenges to a city’s infrastructure, resources, security procedures, and emergency response systems. Meeting these challenges will be critical to the success of cities in the decades that follow. The safe city concept has been developed precisely to help government stakeholders, city mayors, and police departments mitigate these challenges. Leveraging the internet of things (IoT) and the connectivity now found in core security and safety technologies, safe city solutions are providing a range of systems including predictive analytics and big data, real-time response procedures and emergency response systems. These solutions are enabling governments and police departments to better protect their citizens from everything from terrorist attacks to natural disasters. They are also supporting wider city organizations such as public health, fire and rescue, border control and social services to better serve their citizens. Safe cities create a better life The safe city concept is based on a consolidated ICT platform which combines public-safety information of different types and from different sources, obtained through sensors and multi-agency collaboration. Safe cities are an essential pillar supporting the development of smart cities throughout the world. They provide the security and safety required to protect citizens from crime and terrorism as well as mitigate, as much as possible, the impact of natural disasters and other threats. A successful safe city solution should support a city’s security agencies, fire and rescue departments, public health and social service departments before, during and after an event, and integrate the disparate technologies and government departments responsible for citizen safety.he safe city concept is based on a consolidated ICT platform which combines public-safety information of different types and from different sources, obtained through sensors and multi-agency collaboration. Four major requisites Prevention: It provides reliable and comprehensive security measures to predict threats and hazardous situations. City authorities must be able to take measures to prevent threats from occurring in the first place. Simulation and forecasting technology, based on big data mining, can help the relevant authorities to predict public threats and support police and military assets to prevent the event before it begins. Detection: It aids to public-safety organizations in collecting, sharing and analyzing data more effectively to provide early warnings and raise situational awareness. Sensor systems in the city will proactively gather information. These sensors may include video surveillance cameras, CBRNE (Chemical, biological, radiological and nuclear) sensors, gunshot-detection sensors, and weather sensors. The type of sensor used is determined by the scope of the safe city project and how much inter-operability is required. Information can be used to provide early detection and alerts when events occur. Increasingly, sensors include ‘listening’ to social media for relevant posting by netizens. Response: It enables the key organizations in the city to react to security threats in real time. City authorities must be able to prevent an adverse event from escalating. Safe city projects enable an effective response by using a consolidated ICT platform to provide a common operational picture to all relevant agencies, including law enforcement, public health, fire and rescue services; and to allow the critical communication systems of these agencies to inter-operate. This helps to raise the situational awareness for each of the responding agencies, and their command, control and coordination. Recovery: It provides post-event examination and analysis, identify victims and provide assistance in rescue actions. After an event, city authorities must be able to quickly examine and analyze all data received from the relevant sensor systems. This supports the subsequent search for suspects as well as the process of building a case based on incriminating evidence. Information can also be used to facilitate rescue actions, and the identification and assistance processes for both victims and survivors. Integration The safe city concept typically promotes inter-operability across law enforcement, emergency services and other government agencies (public health, border control, social services) to streamline operations and provides ‘situational awareness’ to all stakeholders involved in the management of a city’s security. This approach fosters better cooperation and sharing of intelligence. While much of the emphasis of the ‘safe city’ discussion involves security technology implementation and investment, the operational procedures and ICT backbone are just as important in the solutions’ ultimate success or failure. This reality means that ICT and security agencies must work together for the greater good of the safe city project. One cannot exist without the other. The size of the city does not impede its ability to be considered a safe city but differing city sizes require different levels of technology investment, stakeholder ‘buy-in’ and planning. Safe city solutions are often layered on top of the legacy infrastructure that is in place. Overall, detailed planning around the use of legacy technology and the need for new infrastructure are key considerations when deploying safe cities. Market drivers There are a number of market drivers that government agencies need to consider when deciding how to proceed with a safe city project. These can be broadly grouped as safety drivers, social drivers and economic drivers, and the government investment in safe cities has a positive impact on each of them. Safety drivers: at its core, a safe city addresses issues related to crime and terrorism. Often, these types of incidents cause regulations surrounding data privacy and national security to shift. For instance, after the September 11th attacks, the United States Congress passed the Patriot Act, which set up fusion centers to surveil and aggregate vast amounts of data including video surveillance streams, social media, arrest records, warrants and even mug shots. These centers, now known as ‘Intelligence Fusion Centers,’ are becoming increasingly important, as agencies emphasize predictive policing. Social drivers: Political motives are a key driver of safe city projects. Politicians can use safe city initiatives to generate support in their campaigns with citizens who are concerned about…

Read More