Category: Feature
Choosing the Right VMS Why AXIS Companion Could be the Best Choice
When choosing a video management software, a person wants something easy to install, operate, and maintain as well as scaling up. The recently improved AXIS Companion is a user-friendly and cost-effective VMS that works for many installations. Read on to find out how. To make the most of your network video surveillance system, you need the right video management software (VMS) to get the features and functionalities you need. Also, you want something reliable and which provides ease of use, from design to maintenance. Axis’ network VMSs, AXIS Camera Station and AXIS Companion, are the heart of Axis’ all-in-one and validated end-to-end security systems. AXIS Companion is constantly improving when it comes to features and functionality. “With the most recent release of AXIS Companion, we have added new functionalities that make it much more competitive,” said Mitch Mershon, Business Development Manager End-to-End Solutions, “It’s a very cost-effective solution, as the software comes included with the hardware. It works with any Axis-branded camera, and we can do onsite recording, either to an SD card or to a recorder.” Today, AXIS Companion is a well-rounded and secure VMS that is easy to set up and operate. And it is scalable and flexible. Depending on your needs, you can integrate network video, audio, and door stations. Moreover, if your needs change considerably, you can migrate easily to AXIS Camera Station to access its extra features and functionalities. Crucial to focus on the user needs Traditionally, project size and the camera count have dictated what surveillance VMS you would choose. But this perspective can set you off in the wrong direction. “Axis is trying to shift the conversation away from any camera count or licensing structure to refocus on ‘what are you looking to do?’” Mitch said, “What are the end-user needs, and based on that, we can discuss which is the best software?” Many end-users have the need just for a system to record, playback, and export video. AXIS Companion provides the much-appreciated Axis quality for end-users where cost can be prohibitive. AXIS Companion is a cost-effective and solid solution that can also serve large multi-site installations in a great way. It is true even if you have thousands of cameras distributed across hundreds of sites. Among the several customers using AXIS Companion, there is a large oil and gas company with around 100 sites. Another example of a large multi-site installation with AXIS Companion is a chain of convenience stores in Latin America that uses AXIS Companion to manage approximately 9,000 stores with more than 35,000 cameras. An easy to use and reliable solution In fact, there is more to AXIS Companion than many realize. Dan Vogl, Business Development Manager End-to-End Solutions, said that – “If a customer is looking for an easy to install, reliable, plugand-play solution, AXIS Companion is a great fit. Anyone with access to internet and Axis cameras can benefit from the wide variety of functionalities with live viewing and forensic research, which this end-to-end solution provides.” Mitch agrees, explaining – “AXIS Companion is very much a hybrid system. You have the cameras and all the recording on-premises in your local network. Then there are all the remote functionalities such as user administration, remote access, health monitoring, which is done by our backend, by the cloud.” Open platform offers new functionalities The ability to integrate AXIS Companion with AXIS Camera Application Platform (ACAP) opens up many possibilities. This open platform makes it possible to download and install value-adding analytics that can significantly improve the performance of your system, for example, within security or business intelligence. One example is AXIS Guard Suite license-free analytics that provides motion, intrusion, and loitering detection. Another is AXIS object analytics for AI-based object detection and classification of humans and vehicles. These analytics can be used to send push notifications to a mobile phone. By pressing these notifications, the recording of a specific incident will instantly open. This functionality is available in the apps but also on the PC client. Dan added, “We have just recently implemented support for I/O based notifications, which provides the possibility to integrate third-party sensors like Alarm Panels or relays to receive push notifications.” New recorder improves cybersecurity The launch of the new, compact network video recorder AXIS S3008 opens many possibilities, bringing more overall performance to the system. For example, Axis has improved cybersecurity such as encrypted hard drives – a welcome feature. “Preventing cyberattacks is crucial,” Dan said, “We’ve made extensive investments to make AXIS Companion highly secure, especially as it’s an IoT solution relying on the internet.” All in all, AXIS Companion offers excellent bang for the buck. When choosing an Axis endto-end solution and AXIS Companion as your VMS, you get installation and operation simplicity, for example, through low maintenance work and automated updates. And with the entire system from one supplier, you also get a tailor-made solution with matched products and a technical support team trained on every product.
Cybersecurity Trends for 2021-2022
Alexey Parfentiev Senior Business Analyst, SearchInform What are other key security threats except for the risk concerning remote work amid the pandemic and the upsurge of phishing related to Covid-19, charities, sellers of protective equipment, hand sanitisers? Let’s dig into the risks which had been gaining significance even before the lockdown and only took deeper roots during it. Ransomware Ransom attacks are on the rise and present a tremendous threat to multiple businesses denying companies access to their own data and demanding huge payment to get it back. Two large-scale ransom incidents cause FBI director Christopher Wray emphasise the need to discourage the attackers by not transferring them any money in a doubtful exchange for the data. Colonial Pipeline oil and gas transport network as well as JBS USA, one of the biggest meat producers, paid ransom up to $4.4 million and $11 million in June. User awareness User awareness still requires boosting. 97% of users can’t identify a phishing email. Companies begin to focus on security policies more actively than ever to successfully conform to corporate and general rules and regulations. Healthcare sector attacks I t’s no surprise, the pandemic affected healthcare security in a major way. Cybersecurity of this sector will receive $125 billion by 2025, which is 4 times more than it was planned to invest till 2027 back in 2019. Multi-factor authentication As far as many violators have learned how to bypass these authentication methods, it is recommended now to use app-based authenticators and security keys, hardware multi-factor authentication. Machine learning Ever-growing cybersecurity significance needs data to be analysed with implementation of machine learning. Threat patterns and violators’ behavior can be constantly learned by the program to respond to incidents proactively. The number of SOC will increase SOC (security operations centres) is expected to grow to $1.6 billion by 2025 from $471 million in 2020, according to Markets and markets. A security operation center is created within a company to unceasingly monitor and assess the level of corporate security. The center detects, analyses and manages incidents continuously as they occur. The key point of SOC is to track an organisation’s activity inside and outside the perimeter in real time. SOC teams are responsible for employee and customer data control, ensure that hardware and software usage is super vised. A SOC accumulates and processes all the data sent via various communication channels within a corporate network. Passwordless authentication People tend to forget their passwords no matter how much they would want their details to be safe, and begin to use passwords which are easy enough to remember and too simple to break. Non-password authentication principles are provided by FIDO Alliance, where access is enabled via logging with biometric data, tokens etc. Zero Trust Due to having to ensure access to a big number of remote users, zero trust approach is gaining momentum. Least privilege access is required to be given to both gear and users. The security levels are to be represented by any of these 3 concepts – enhanced identity governance, micro-segmentation, network infrastructure and software defined perimeters (SDP). Cloud security In order to cut the costs and due to remote work necessity cloud deployment software models are becoming increasingly popular, as well as cloud security measures which have to be taken and cloud storages. Surge of cloud usage influences hacker to refocus onto cloud sometimes poor security or lack of password protection, but also it promotes further developing of predictive security, thanks to which it will be possible to identify potential threats. GDPR compliance GDPR compliance keeps being a popular objective. The personal data protection issue appeared to be a complicated one, the bigger the company is the more the data it processes and stores. Higher education threats Switching to remote studying impacted the safety of students’ data. In the US education isn’t a priority sector for cybersecurity improvement. Besides, 11% of attacks on US educational institutions are motivated by espionage. Supply chain The attack might stem from international espionage, state enemies, or get originated by hacktivists. The purpose is to destroy the systems, exploit the vulnerabilities, undermine the work of suppliers and contractors by making use of inadequate security practices, inserting a time bomb, compromise the assets. IoT The majority IoT gadgets present high risks of information security issues. Irrespective of whether it is consumer-facing or enterprise-focused, the reality is that IoT devices need better security. Manufacturers must take responsibility to protect these devices and warn users of possible cybersecurity threats. Sadly, making the sale seems to be the only priority. But the situation might improve if vendors are motivated to take IoT security more seriously. For example, regulators could fine manufacturers if found guilty of neglecting their corporate responsibilities when it comes to securing devices. One of the biggest problems is the login and password details of connected devices. These are typically preconfigured by manufacturers. Using sophisticated tools, hackers can ‘snoop’ the Internet for these standard details and can easily gain access to them, severely compromising the user. Another challenge is how easy it has become for manufacturers to send through updates to connected devices. Because this communication is unencrypted, patches can be installed remotely for bug fixes. While ostensibly a good thing, they do leave back doors open for malicious users to exploit. Financial services cyberattacks Phishing is both a remaining and growing problem depending on which sources it exploits – it’s still as prevalent via email and is increasing in number via social networks and other messaging platforms. Malware and data breaches are among the popular security problems for financial institution as well. Boston Consulting Group found that financial services companies are 300 times more likely to face cybersecurity attacks than enterprises in other industries. Moreover, cyberattacks on financial institutions spiked by a massive 238% from the beginning of February to the end of April In 2020 cyberattacks on financial institutions were rocketed by 238% amid the COVID-19 pandemic, according to Infosecurity Magazine. Eventually, attacks cost the banking sector $18.3…
HID Global Expands RFID Tag Family with Options for Item Tracking and Broader Inventory and Supply Chain Security
HID Seal Tag that protects metallic assets during storage and distribution HID Global, a worldwide provider of trusted identity solutions, recently announced two additions to its broad family of RFID asset-tracking tags. The HID SlimFlex Ultra technical label is optimized for the strongest durability compared to other labels, and the HID Seal edTamper Aura is designed to securely track and trace highly sensitive materials and digitally detects unauthorized access to sealed containers like boxes or crates. “We continue to solve customer challenges across a variety of RFID applications, from monitoring individual items under harsh conditions to ensuring that the seal integrity of secured inventory or high-value commercial shipping goods has not been breached,” said Jean Miguel Robadey, VP of Industrial Smart Components with HID Global. The HID SlimFlex Ultra label’s special construction increases durability when mounted to non-metallic flat or slightly curved surfaces. It joins HID’s comprehensive family of High Frequency (HF) and Ultra-High Frequency (UHF) RAIN® RFID tags that withstand exposure to harsh elements, chemicals, and extreme temperature for waste management, food distribution applications, and other asset tracking applications. Custom colors are available as well as 1D/ 2D barcode and laser-engraving options for special branding or other identification needs. Affixed to metal, non-metal items or containers, HID’s Seal edTamper Aura tag combines tamper-evident fasteners with RFID technology that transmits item ID, seal status, and a digital notification when a seal is compromised. They can be used for scanning of large sets of sealed items such as weapons, racks, controlled medications, or other assets needing protection. Main advantage of the new tag is that you can itemize and detect the status of the assets without opening the storage container during security checks using RAIN® RFID handheld or stationary readers. HID offers one of the industry’s most diverse and flexible lines of RFID tags and transponders for tracking objects, monitoring activity, and improving processes. Its offering is backed with more than two decades of RFID development and manufacturing expertise.
Cybersecurity to be Prioritized in Cryptocurrency Transactions
By Vikas Bhonsle, CEO, Crayon Software Experts India Cryptocurrency is currently one of the most trending financial tools or currencies, grabbing attention across the globe. Bitcoin, Ethereum, Cardano, Dogecoin are some of the most popular cryptocurrencies we have heard or read about in the media. If predictions are to be believed, then these cryptocurrencies can impact global finance in the coming times. However, the rise and increasing popularity of cryptos also increase the added risk of cybercrimes that need speculation. But first, let’s understand more about cryptocurrencies. It is an electronic form of a digital asset or currency that operates as a medium of exchange like any other legacy currency. However, it’s an encrypted form of electronic payment that uses cryptography for safe transactions. Cryptos are decentralized digital assets that allow individuals or institutions to make transactions without any dependency on legacy banking institutions and governments. This very fact alone represents both the boon and bane of this technology. The absence of any regulators or legal structures is also free ground for cybercriminals to romp. Cryptocurrency is already the most preferred medium of payment in ransomware attacks. Cybercriminals hide their true identities while they make ransom demands in digital currencies. When making an exchange, they can easily convert cryptocurrencies into traditional forms without ever being discovered. Cybercriminals can hack into cryptocurrency trading platforms and redirect the funds. They can attack any business and demand ransom in digital currencies as this form of cybercrime is outside the legal grid, and no evidence leads back to the perpetrators. With cryptocurrencies spreading across the business world, cybercrime has become a real threat. Cryptocurrencies have also evolved as an excellent money laundering channel. Businesses or even individuals who make exchanges using cryptocurrencies are thereby potential cyber-attack targets. The following cybersecurity risks are to be looked out for: Phishing: In a phishing attack, trading platforms are targeted with malicious emails or links with the primary goal aimed at stealing user’s credentials that scammers can use to ask for profit or ransom. Hacked trading platforms: Here, cybercriminals compromise the trading platforms by stealing funds from the users. Compromised registration forms: The registered data by the user can be compromised, and hackers can or will then sell it in the illegal market for profit. Third-party applications: An excellent way for cybercriminals to breach and access user data and target further attacks. Malware: cryptocurrency-related malware enters the mining machines, steals the infected computer’s mining resources, along with the cryptocurrencies from online wallets. Thus, it is primarily essential that the security measures of any crypto transaction platform are full-proof and have a multi-pronged approach to cybersecurity solutions. Until and unless regulations and strict monitoring come in place, caution and instinct can go a long way in keeping our crypto transactions safe.
IPSA Announces the Appointment of an Alliance Ambassador for India
The International Professional Security Association (IPSA) is determined to support and be available for all the front-line members. With the launch of its new app and the free membership offer, IPSA is now taking a huge step towards expanding its membership in India. IPSA has announced the appointment of Jitendra Shukla CCSMS, CCPS AA. IPSA as the IPSA Alliance Ambassador for India. Along with a post-nominal, the role fetches many responsibilities and important undertakings which are in sync with IPSA’s core missions and values. The IPSA AA will be expected to raise the importance and criticality of the front-line teams with the clients, end users and wider industry. One of the goals to be achieved by the role would be to encourage the ongoing professionalism of the sector in India through the membership of a professional body like IPSA and training enhancements. Apart from working closely with the IPSA Chair and CE, the AA will also provide feedback on local market trends or regional specifics that need to be captured within the IPSA organization. They will monitor international situations related to the AA region and IPSA. Jitendra Shukla IPSA Alliance Ambassador for India “I am extremely honoured by the role bestowed on me by IPSA and I would like to thank the Chair and CE for that. As India AA IPSA I will strive to get us the due recognition as a professional body for the security industry. IPSA should be a common platform or a single voice for improving the service standards and infrastructure required for us to deliver world class services and at the same time enhance the lifestyle of the security practitioners. IPSA will be able to deliver this by imparting world class training and certification. I am counting on my colleagues who are the leaders in the security industry to help IPSA achieve the goals” With the introduction of an AA, IPSA’s vision is to represent all front-line personnel and companies, and promote diversity, inclusion, training, mentoring and career development. By providing representation and working closely with the sety companies to raise the standards and encourage professionalism, IPSA aims to give ‘One Voice’ to the private security industry. Simon Pears, Chairman of IPSA said, “IPSA continues to gather strength and represent our frontline membership. India is part of this growth and continues on the journey to raise the professionalism of the sector. Jitendra Shukla has a wealth of industry experience and understands the market and growth opportunities and I am proud that he has agreed to be the IPSA Ambassador for India and be part of the exciting journey ahead.” Jitendra’s experience and passion for the industry makes him the perfect candidate for the role. He specializes in corporate security management which entails staffing and training, business analytics, operations, vendor management, emergency protocols and disaster management. Prior to working within the private security sector Jitendra was a member of the Indian Air Force and is a trained commando. He has extensive knowledge of security regulations and is instrumental in ensuring the alignment of security solutions with the local regulations. He has built a network of key contacts within security and other industries. With his connections and expertise, Jitendra will be playing a pivotal role in empowering the front-line security teams of India. “I am extremely honoured by the role bestowed on me by IPSA and I would like to thank the Chair and CE for that. As India AA IPSA I will strive to get us the due recognition as a professional body for the security industry. IPSA should be a common platform or a single voice for improving the service standards and infrastructure required for us to deliver world class services and at the same time enhance the lifestyle of the security practitioners. IPSA will be able to deliver this by imparting world class training and certification. I am counting on my colleagues who are the leaders in the security industry to help IPSA achieve the goals,” said Jitendra. Simon Pears Chairman of IPSA “IPSA continues to gather strength and represent our front-line membership. India is part of this growth and continues on the journey to raise the professionalism of the sector. Jitendra Shukla has a wealth of industry experience and understands the market and growth opportunities and I am proud that he has agreed to be the IPSA Ambassador for India and be part of the exciting journey ahead” The International Professional Security Association (IPSA) is a membership body for individuals and companies working in security and associated roles. The Association was formed more than 60 years ago to ensure professionalism in the management of security operations. IPSA is an established and recognised worldwide professional organization and provides, in accordance with growing demand, a specialised unrivalled service to industry/ commerce. There are no geographical boundaries in operation and the highest technical standards are stringently applied in all our dealings. The Association operates within the framework of fourteen regions which includes many overseas countries.
9 Core Elements that Ensure Businesses Have the Best System for their Needs
By Rishi Lodhia Managing Director for EMEA and India, Eagle Eye Networks Today’s video management system (VMS) is not your simple solution of the past. Gone are the days when the VMS was used solely for surveillance and security. A modern cloud-based system goes far beyond that, providing analytics and business intelligence to make your organization smarter and more efficient, and your business a safer place. Whether you’re trying to create a more customer-centric restaurant, efficient retail operation, safe gym environment, or healthy campus, a true cloud VMS can be paramount to your success. Who will benefit from this guide? Eagle Eye Networks experts speak every day with people seeking to better understand cloud video surveillance, but many don’t know where to begin. These individuals are often owners or operators of multisite commercial businesses who are responsible for: Managing 10 to 50 sites such as retail shops, gymnasiums, and quick serve restaurants. Operating 10 to 35 video surveillance cameras per site. Selecting a new video surveillance system with a budget over $75,000, or upgrading an existing system with a budget over $25,000. Continually finding ways to make their business more efficient, effective, and secure. If any or all of these points resonate with you, this guide to cloud video management system (VMS) key elements will serve you well. That said, everyone from small business owners to enterprise customers can glean takeaways from these pages. At a high level, this guide explains the top nine key features of a cloud video surveillance system. Cloud for video surveillance What exactly is ‘cloud computing’ and how do businesses like yours use it for physical security and video surveillance? Cloud computing simply means storing and accessing data on the internet versus storing and accessing data on a computer that’s ‘on-premise’ (installed in your business). While the term ‘cloud’ is often used loosely, with a true cloud video solution, the video is processed and managed in the cloud. The true cloud system may have an onsite appliance, but that appliance is simply a communication conduit that conveys information from security cameras to the cloud. The move to cloud-based systems of all kinds, not just video surveillance, was well under way by the beginning of 2020. It’s not always obvious, but cloud systems are mainstream in most circles – for example, if you have systems that manage payroll, customer relationships, or workflows, they’re likely in the cloud. But the onslaught of COVID-19 greatly accelerated the adoption of cloud systems. In fact, research indicates the percentage of companies that have more than one critical business application in the cloud jumped from 60 percent pre-pandemic to 90 percent today. The top reason given is data access from anywhere, any time. The global pandemic brought with it quarantines, remote work, and new ways of communicating with colleagues and customers. These changes have helped illuminate and amplify the benefits of cloud for video surveillance. Let’s take a look at how multisite commercial businesses benefit from cloud technology for video surveillance: Cost and maintenance Cloud offers a much lower total cost of ownership (TCO), with substantial economies of scale. A cloud system should offer a subscription-based model, so you only pay for what you actually need and use. You can also save money by choosing a VMS partner that doesn’t lock you into purchasing its cameras. Instead, choose a VMS partner that lets you use the cameras you’ve already installed, select your preferred cameras, or use those of the cloud vendor. With cloud, the cost of maintenance is also significantly reduced. That’s because you don’t need to worry about updating your system. New features and security enhancements happen automatically. Cloud systems continuously deliver updates over-the-air. “The onslaught of COVID-19 greatly accelerated the adoption of cloud systems. The percentage of companies that have more than one critical business application in the cloud jumped from 60 to 90%“ Cybersecurity With your video surveillance system connected to the internet, cybersecurity should be fully addressed by the cloud vendor, and it should provide the end user features for secure sign-in, user permissions, and audit trails if needed. System cybersecurity should include: Secure encryption to buffered and locally-recorded video. Constant monitoring against threats. No open ports or onsite firewalls. No onsite software to patch (updates are automatic). Triple redundant storage for events. Two-factor authentication. Scalability Adding locations and cameras, increasing the number of users, adjusting camera resolution, and extending video retention periods are just some of the reasons that multisite commercial customers and others demand a scalable solution. Traditional premise-based VMS systems make it difficult to do this and lack the infrastructure and flexibility to meet these needs. Conversely, cloud-based solutions are designed to run on a scalable set of computing and network resources. With a true cloud system, it’s easy to centralize your video surveillance across multiple locations, add and delete users, and adjust retention and resolution in real time. PRO TIP Look for a cloud that’s purpose built for video There are public clouds, some of the most well known being Amazon Web Services (AWS) and Microsoft Azure, that companies pay to store and manage their data. These public clouds cater to large numbers of users who pay as needed, but are subject to the policies and security measures implemented by the cloud provider. Then, there are private (often called hosted) clouds, such as the Eagle Eye Cloud, which is purpose-built to store and manage video. Anywhere access A well-engineered cloud VMS will include a modern mobile app so users can conveniently access video and manage features anywhere in the world with internet collectivity from their computers or mobile devices. Cloud VMS subscribers can activate features, such as video analytics, with the click of a button, without needing to install any additional software. Camera flexibility Cameras are to your VMS as tyres are to your car. Because just as a car relies on its tyres to run, a VMS relies on cameras to be its source of data … to drive security…
Ransomware Ravaging the World
Iqbal Singh Technology Expert & Senior Corporate Executive in a European MNC Imagine you booting your laptop in the morning to start your workday and you have the below message staring at you from your laptop screen. This is an example of a screen-locking ransomware that holds your computer hostage by blocking your access to the operating system and there is almost nothing you can do to access your files and data on your laptop. Now imagine the victim of ransomware instead of being a single user in an organization, maybe an oil pipeline company with a pipeline network of nearly 9000kms or a meat company with plants across the globe or a 800 store retail company. Yes, all of these are real examples of organizations who have been recent high profile victims of ransomware. Ransomware is ravaging the world | Andrey Popov / Getty Images WannaCry ransomware note. Image: Cisco Talos On 07 May 2021 an employee of Colonial Pipeline – the company with the largest pipeline in the USA found a ransom note from hackers on a control-room computer. This provoked a shutdown of their operations for five days, which resulted in a temporary fuel shortage along the East Coast, leading to spike in gas prices and huge queues of consumers at gas stations. The CEO of the company confirmed that they paid a ransom of $4.4 million. 30 May 2021 JBS, the largest beef supplier in the world, suffered a cyberattack, disabling its beef and pork slaughterhouses. The attack impacted facilities in the United States, Canada, and Australia. The company paid a ransom of $11m to the hackers. The Swedish Coop grocery store chain closed all its 800 stores on 03 Jul 2021 after a ransomware attack on American IT provider Kaseya left it unable to operate its cash registers. Hundreds of American businesses were also hit by an unusually sophisticated attack that hijacked the widely used Kaseya software. What is Ransomware? Ransomware is a form of malicious software – malware – that encrypts files and documents on anything from a single PC all the way up to an entire network, including servers. The attacker then demands a ransom from the victim to restore access to the data upon payment. Victims can often be left with limited choices; they can either regain access to their encrypted network by paying a ransom to the criminals behind the ransomware or restore from backups or hope that there is a decryption key freely available. Or start again from scratch. Hackers have been mostly unforgiving and ruthless in choosing their ransomware targets. They have not spared even health-care providers, municipalities and schools, big commercial organizations, of course, are expected tempting targets. The Washington Post found that ransomware attacks in the United States more than doubled from 2019 to 2020. One of the unfortunate success stories of the coronavirus times has been ransomware. Studies consistently show that the scale and cost of ransomware continues to grow. Methods of Infection Understanding how ransomware infects and spreads is the key to avoiding falling victim to an attack. Post-infection, ransomware can spread to other machines or encrypt network filers in the organization’s network. In some cases, it can spread across organizational boundaries to infect supply chains, customers and other organizations. All of the following can be vectors of infection for ransomware attacks: Phishing. Compromised websites. Malvertising. Exploit kits. Downloads. Messaging applications. Brute force via RDP (remote desk protocol) History of Ransomware Even though ransomware is making headlines in recent years the scheme is not new. The idea of taking user files or computers hostage by encrypting files, hindering system access or other methods and then demanding a ransom to return them is a few decades old. In the late 1980s, criminals were already holding encrypted files hostage in exchange for cash sent via the postal service. One of the first ransomware attacks ever documented was the AIDS trojan (PC Cyborg Virus) that was released via floppy disk in 1989. Victims needed to send $189 to a P.O. box in Panama to restore access to their systems, even though it was a simple virus. The AIDS demand for payment – by post. Image: Sophos Ransomware attacks were still not that common well into the 2000s – probably due to difficulties with payment collection. It was the emergence of cryptocurrencies such as Bitcoin in 2010, that completely altered the landscape. It provided an easy and untraceable method for receiving payment from victims, virtual currencies created the opportunity for ransomware to become a lucrative business. Cyber criminals were quick to latch on to the monetization opportunity that Bitcoin created. This resulted in a substantial proliferation of ransomware beginning in 2012. Intro of CryptoLockers Ransomware was now moving from a petty crime into the realm of financial windfalls. Accordingly, the cyber criminals’ degree of technical sophistication also increased. The levels of encryption started improving from a 56 bit to 660-bit RSA public key encryption to 2048-bits RSA encryption keys by 2014. One significant development was the emergence of cryptolocking ransomware in 2013. CryptoLocker is a strain of ransomware so potent and dangerous that it took a dedicated global government task force to bring it down — but not before the cybercriminals behind it raked in millions of dollars from their hapless victims. It encrypts files on Windows computers, then demands a ransom payment in exchange for the decryption key. It first emerged in September 2013 in a sustained attack that lasted until May of the following year. CryptoLocker fooled targets into downloading malicious attachments sent via emails. Once opened, these Trojan horse attachments would execute the malware hidden in[1]side. Just to give you an idea of the impact CryptoLocker raked in a revenue of $30m within the first 100 days of its appearance. Earlier the encryptions used symmetric keys (same key to crypt as well as decrypt), however, CryptoLocker uses an asymmetric encryption method that makes it difficult to crack. This two-key system uses one public key for…
Resilient Approach has Helped Us Win Over the Odds
Ashish P. Dhakan MD & CEO Prama Hikvision India Pvt. Ltd. SecurityLinkIndia (SLI): Nearly 18 months of pandemic disruption so far and the third wave is largely anticipated – it has not yet been ruled out – what are the impacts on your business, and the security industry at large? It was a great learning experience as it had taught us to be alert, resilient and compliant in the face of adversity. The pandemic disruptions were so sudden and unprecedented that it impacted everybody in some or other way. The security Industry was adversely impacted due to supply chain disruptions and various challenges during this period. We too faced multiple challenges of disruptions, but resilience helped us to overcome the odds. When the entire world and humanity is fighting a crusade against the pandemic and trying to overcome the devastating impact of the second wave, we are setting up a new agenda for the future and acting up on it for the growth of the security industry with a profound human approach. It was a great learning experience for all of us to go through the various phases of pandemic challenges and recovery. We have the resilience and innovative marketing strategies on our side to communicate and engage the target audience in a simple and effective manner. SLI: What are the CSR initiatives you have taken during the pandemic situation? While continuing with our fight against the pandemic, Hikvision India has organised a vaccination drive for its employees, workers and their family members. The vaccination drive was conducted on 20 and 26 June 2021. Through this vaccination drive approximately all employees got covered. The vaccination drive for employees and their family members was organised by Hikvision India as a part of employee welfare initiative to support them in providing protection from the pandemic. The vaccination drive covered the vast pool of employees, which include not only our employees, workers and their families, but also those in the extended ecosystem. Hikvision India had helped the ecosystem partners in the pandemic by providing oxygen concentrators. It has delivered a substantial number of oxygen concentrators to the applicants across India as a part of its CSR Initiative to support its employees, partners, end-users and extended security professional community. The company has launched this CSR Initiative on 27 May 2021 to provide timely support to security business community, system integrators, distributors, vendors and employees and their family members. Under this CSR initiative, oxygen concentrators were successfully delivered free of cost to the verified applicants across India. SLI: How do you foresee the future of security industry amid third wave, and beyond? The medical expert and government bodies had predicted that third wave of the pandemic will have a less severe impact due to vaccination and enhanced awareness. Security Industry ecosystem should continue to be alert, resilient and compliant to the pandemic guidelines and protocols. One thing is clear at no point, we can afford to be complacent about the risks of the third wave and other threats related to pandemic. The security industry has to move forward with planning their future beyond the spectrum of pandemic. They need to identify the emerging opportunities and trends. Hikvision India has lived up to the challenge of the pandemic situation by doing extensive research and development to offer pandemic safety solutions (temperature screening, face mask wearing alerts, social distancing and flow control solutions). We were one of the first movers in the industry to offer temperature screening solutions. We are grateful to our partners and end-users for their consistent support and unshakable trust. We are hopeful that security market will get back to its peak performance level. Though the pandemic situation had created a major challenge for the security industry, but a resilient approach has helped us to win over the odds. SLI: Which new initiatives Hikvision India is taking especially for Indian market? We had the resilience and innovative marketing strategies on our side to communicate and engage the target audience in a simple and effective manner. There are no easy solutions, but the resilience and compliance of the pandemic protocols are the best solutions in these times. We are following stratagem from the market’s own alchemist to ensure a perfect roadmap to recovery. The key priority for us at Hikvision India is to keep on innovating and evolving as an organization while navigating through these challenging times. We have set the strategic priorities of our marketing initiatives to tackle constraints on capacity, capital and capability. It also involves strategic decision making and prioritizing budget for key initiatives and media engagements. Our focused initiatives are based on the evolving market trends, technology advantages, customer and employee demand for societal impact. We have a dedicated special R&D center in India to do the research and development on India specific products and solutions to provide the security solutions as per the requirements. Here some of our innovations go beyond the customization needs of the end-users and create a unique solution as per changing needs. SLI: Which are the significant milestones achieved by Hikvision India? Hikvision India is the leading video security solution provider in the security market. There are three most significant milestones Hikvision India has achieved in the recent times, one is the undisputed market leadership position, the second is ‘Make-in-India’ 2.0 manufacturing plant and the third is going digital across the channels. These three initiatives were rolled out with foresight and missionary zeal. The company has the leading position in the Indian security market and management has shown incredible skills in handling supply chain disruptions and resolving core issues faced by the partner community. We are implementing a series of digital transformation initiatives to keep customers engaged and satisfied undisputed market leadership position, the second is ‘Make-in-India’ 2.0 manufacturing plant and the third is going digital across the channels. These three initiatives were rolled out with foresight and missionary zeal. The company has the leading position in the Indian security market and management has shown…
Future of Loss Prevention-II
Anil Puri CMD, APS group A thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, and one who has mastered the art of strategic and tactical thinking to the core. He has been using this combination to seed new ideas and to lead them to their implementation on-ground. This has been a consistent feature of his career. He has rich experience of approximately 35 years in corporate in diverse domains & from functional managerial level to the apex as chairman of a corporate group. To him, The loss prevention (LP) has always occupied central place when planning the security protocols for the shopping malls, warehouses, large shopping complexes, standalone retail stores and manufacturing plants. He has been keenly watching the developments in the loss prevention techniques emerging in this domain. Old adage loss prevention techniques have stood the test of times but have been breached, losses inflicted and profitability hit. However, emerging innovative technologies have revolutionized the entire perspective of loss prevention. He contributes extensively in framework of security protocols of loss prevention with his ops team before deployment of security personnel at high end shopping malls. Here he shares his thoughts on new landscape which has gradually been shaping in favor of the retailers. Let us see what future holds for loss prevention. Here he propagates the enhanced usage of AI in loss prevention. Introduction Retail shrinkage is a multi-billion-dollar, multi-layered monster that affects organizations throughout the retail industry. The problem spans beyond the physical store and has roots throughout the entire supply chain. Government-imposed public health protocols, social restrictions and lockdowns that have arisen because of the COVID-19 global pandemic have changed the way people do things the world over. The impacts on the retail sector have been significant, translating it into levels of adversity unlike anything business has ever before faced. For retail loss prevention teams charged with ensuring the safety and security of the business’ employees, customers and product, the shifts and accelerations in consumer behavior mean that they have to rethink & revisit their strategies. They have had to leverage their creativity and innovation in order to pivot and respond to a whole new set of challenges. Globally many retail loss prevention forums have organized events to help address the evolving concerns of today’s loss prevention professionals and discuss the ways by which leaders within the industry are proactively producing effective solutions to protect their businesses. This has provided virtual attendees with thought leadership, critical insights into best practices with respect to day-to-day retail operations and an incredible opportunity to network with industry colleagues concerning the most pressing issues their industry is facing today. How to disrupt the organized crime? The scourge of organized retail crime (ORC) continues to cast a pall over retail operations, with the number of incidents escalating since the start of the pandemic. Given the increasingly sophisticated means by which these groups, who often travel from region to region, are striking neighborhoods and cities indiscriminately, the role of loss prevention teams in curbing this very serious threat is critical. It is time to unpack this complicated issue for retailers and discuss some of the ways in which loss prevention teams can enhance the protection of their organizations. As impacts of the pandemic continue to influence the way today’s consumer shops and accelerates online activity, retailers are faced with more adversity than ever before in providing a safe, secure and seamless environment in which to serve their customers. To better understand how these changes in consumer behavior are impacting retailers’ efforts to ensure a best-in-class experience during these difficult times, and to share insights concerning some of the incredible pivots being made by loss prevention teams in order to support their organization’s operations and service. Potential Ramifications The sessions organized by loss prevention forums focused on the potential ramifications of ORC to retail operations, the trends that are related to the activities of these crime groups, as well as some of the proactive steps that can be taken by loss prevention teams in order to deal with the risk like: (a) Retailers should join any network that is available to them. (b) If there aren’t any, they should create one for themselves (c) Be proactive in hosting opportunities to get together with law enforcement partners, fellow loss prevention officers, community associations, city politicians and crown attorneys to hold ongoing dialogue. Creating these communities makes it easier for everyone impacted by these crimes to identify associated trends and more difficult for ORC groups to operate as efficiently as they’d like to. Developing a Threat Awareness Another threat wreaking havoc on retail operations is found within the digital world. Though perpetrated by living, breathing human beings, the veiled activities of cybercriminals allow them to conduct their misdeeds behind a screen and provide them both with relative anonymity and the digital tools they need to undo a business. It is important to understand the ways in which a cyber threat and incident can occur as well as the potential ramifications to the retail bottom line and the steps that are required of organizations to properly deal with the issue. What is needed is – Developing the threat awareness, understanding of relevant prevention information and adhering to best digital practices will be key. Too often, the cyber-attacks go unreported. As a result, the attackers are emboldened knowing that law enforcement is unaware of the scope of the problem and that the incidents likely won’t be investigated. It’s imperative that any and all cyber attacks be reported to the police. In tandem with the incident reporting to law enforcement, retailers must follow the procedures that have been outlined within their company’s cyber incident response plan. If a plan has not been developed, then it should become a quick priority. That’s where retailers and law enforcement will be able to make a difference, making it harder for cybercriminals to operate, thereby reducing the level of victimization….
Navigating Change with Professional Services in the New Reality
Nadia Boujenoui, Vice President of Customer Experience, Genetec Inc. The raison d’être of an IT provider’s professional services is to optimise the performance of the solutions implemented at the customer’s premises, and thus to meet their operational needs as precisely as possible. However, in just a short while with the pandemic, these needs have changed radically, as companies have had to adapt and completely rethink their operating methods to cope with the crisis. To continue to support them as closely as possible, professional services must also transform their offer and consider trends that have emerged or that have already been underway for several years and that have now accelerated. Remote services to meet the cloud boom As a direct result of social distancing measures and the massive use of teleworking, cloud consumption has grown dramatically in 2020 and is expected to continue to do so in the years to come. 57% of companies believe they will spend more on SaaS solutions this year, and 49% on public cloud. In the physical security sector, where the cloud has traditionally played a minor role, this has resulted in the emergence of hybrid solutions that allow existing solutions to remain on site, move to the cloud for specific applications and gradually migrate systems as needed. This new development does add a layer of complexity to those carrying out complex, multi-system and multi-site physical security projects, including the job of integrators who support them. For professional services, this means offering services linked to easing the transition to a hybrid or cloud model, but also changing the way these services are delivered and packaged so that they are more consistent with the cloud – remote and longer-term services, covering the entire life cycle of the customer and their experience Strengthening cyber security services At the same time, cyber attacks have increased. Hackers have seen and seized many of the opportunities generated by the rapid and improvised implementation of teleworking in companies during the initial containment. In this context, 90% of companies have seen an increase in cyber attacks. The news of the last few weeks also shows that the trend is not weakening. Cyber security cannot be improvised. It involves choosing the right solutions, with several layers of protection such as encryption, authentication and authorisation, and acquired from trusted suppliers, recognised for their transparency and the reliability of their products. This is essential, but it is not enough. To strengthen their cyber hygiene, companies must also consider every integration, every configuration, every password in the deployment and life cycle of their software and hardware solutions. A multitude of risks must be minimised to ensure the best protection. Professional services are best placed to assist in protecting not only their enterprise customers, but their integrators. Both of whom can be confident that their solutions have been optimised by the people who know them best – the people who developed and market them. To build resilience, companies need to be able to rely on services that assess their current cybersecurity, across all components of their infrastructure, and professional services need to take a more proactive approach to building resilience. Despite the pandemic, the missions of professional services remain the same – to deliver value and minimise risk in the deployment of systems, and then to ensure that everything works as intended over time. But the nature of these services needs to adapt, as deployments are now more open to the cloud and the risks are greater and more present. It is this new reality that professional services must consider.