Tag Archives: Data

SASIG warns cyber security profession to meet growing social media threat

The Security Awareness Special Interest Group (SASIG) is calling on cyber security professionals to strengthen procedures surrounding the use of social media. The warning about the growing threat posed by social media to the integrity of data and network security emerged during this week’s conference entitled ‘Cyber Security: The Implications of Social Media’ that was organised by SASIG in conjunction with The University of Surrey.

The audience of cyber security specialists explored the implications of the far-reaching change brought about by social media and how people interact on different platforms such as Facebook, Instagram, YouTube, Twitter, WeChat and others, highlighting the consequences of casual Internet surfing and posting.

Martin Smith MBE, founder and chairman of SASIG, informed upwards of 200 delegates that social media networks have become one of the biggest gateways for cyber criminals targeting individuals and businesses to gain access to sensitive information and data networks.

Smith stated: “Social media activity has boomed during the last decade and is now an integral part of communications for commercial and personal users. It creates many challenges for both business and personal use and can expose users to unintended risks.”

He continued: “Social media and Internet users often give up a considerable amount of personal data. However, if such information falls into cyber criminals’ hands, they can easily build a profile that gives them the capability to access sensitive personal and financial information.”

Further, Smith observed: “The new Online Safety Bill could prove to be a vital tool in the challenge to tackle the criminal gangs who target unsuspecting individuals and businesses. We strongly recommend that all organisations should take steps to strengthen their cyber security systems against attacks via social channels. Using a combination of education about threats and introducing stringent protocols can protect against misuse.”

Cyber Security Skills Festival

Career opportunities, skills and resources that protect commerce, industry and public services from cyber attacks will feature at the third annual Cyber Security Skills Festival being organised by SASIG in partnership with the UK Cyber Security Council. The event runs on Tuesday 22 February. 

Established back in 2004, SASIG is a peer networking forum for cyber security professionals who represent hundreds of organisations of all sizes here in the UK and emanate from both the public and private sectors.

SASIG boasts more than 6,000 members including Chief Information Security Officers and other decision-makers and influencers with responsibility for information security, as well as academics and Government agencies.

Annually, SASIG curates more than 150 information webinars and in-person events covering topical cyber security issues impacting business, commerce, Government agencies and other public sector organisations.

*Further information is available online at www.thesasig.com 

Leave a comment

Filed under Security Matters

UVS integrates Lucidity video wall manager with Synectics’ Synergy Command and Control platform

Video wall technology expert Ultimate Visual Solutions (UVS) has announced that its UVS Lucidity video wall controller now integrates with Synectics’ Synergy Command and Control software platform.

The move is part of an ongoing strategic partnership which dates back more than 14 years, with the integrated Lucidity-Synergy solution now being installed across multiple client sites, subsequently helping to protect people and assets across the UK.

Synectics specialises in the design, integration, control and management of advanced surveillance technology for those myriad environments where security is operationally critical.

The Synergy Command and Control solution is highly flexible and user-friendly, helping to ensure customers can always access the information that counts. Mission-critical data is made manageable, meaningful and actionable.

Inaugural project

Based in the ‘Burnley First’ Burnley Business Centre, UVS provides video wall displays and audio visual solutions for a range of clients across the UK and the rest of the world. The company is led by four senior colleagues who, between them, have more than 70 years’ combined audio visual, Control Room and visual solutions experience.

The companies’ first project together using Synectics’ Synergy Command and Control platform was for Wakefield Metropolitan Borough Council’s Urban Traffic and CCTV Control Room back in 2007. Since then, the UVS-Synectics partnership has been involved in multiple security Control Room installations across the UK, including high-security prisons, Government facilities, local council security and Shopping Centre security monitoring applications (the latter including Manchester’s ever-popular Trafford Centre). These installations have provided hundreds of thousands of hours of protection for millions of people and multiple assets.

Large-scale viewing

UVS managing director Steve Murphy said: “The integration brings the significant display functionality benefits of the Lucidity video wall solution to Synergy users, including the display of multiple data sources such as web browsers, remote workstations, message boxes, RSS feeds and collaboration devices alongside traditional CCTV images. Any data source can be displayed anywhere on the video wall, thereby allowing large-scale viewing of data sources during specific incidents.”

Murphy went on to comment: “Via the integration, Synergy also provides detailed alarm configuration to ensure that relevant data is displayed automatically when specific events occur.” 

The most recent Lucidity-Synergy installation includes multiple video walls and provides multiple collaboration device inputs, allowing data from mobile devices such as iPads, phones and tablets to be instantly displayed on the video walls wirelessly via the integration. 

Sree Namelil, product manager at Synectics, concluded: “Synergy is designed to make sure Control Room operatives always have the information they need when and how they need it. Its ability to integrate with leading third party technologies is essential to this mission. We’re delighted to have partnered with UVS on this latest development.”

*For further information on UVS go to www.ultimatevs.co.uk

Leave a comment

Filed under Security Matters

Genetec introduces Security Center v5.10 unified security platform

Genetec – the technology provider of unified security, public safety, operations and business intelligence solutions has recently unveiled version 5.10 of its flagship unified security platform designated Security Center.

Among many new enhancements, this major release allows more system components to run in the cloud, thereby reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex and specialist integrations.

The new version of Security Center brings enterprise video surveillance customers new options to facilitate their migration to the cloud as well as support flexible hybrid cloud architectures. Taking a step further towards unified, enterprise Video Surveillance-as-a-Service, the new version of Security Center Omnicast – the video management system of Security Center – enables the seamless use of tiered cloud and on-premises storage to manage short- and long-term video archives according to customer needs.

In addition, it gives configuration flexibility and reporting capability and supports various scenarios for real-time or on-demand access to video footage stored in the cloud. Depending on its recency and criticality, video can either be stored in high performance storage for fast access or long-term storage to support flexible cost options as well as data compliance. To ensure maximum security, ingested video blocks are encrypted on-premises and then moved to the cloud using encrypted communications channels.

“Last year accelerated the digital transformation of organisations big and small, inside and outside of the security industry,” explained Francis Lachance, director of the video and appliances product group at Genetec. “Omnicast Cloud Storage is not just terabytes in the cloud. It’s a complete collection of media services that deliver the flexibility and sophistication enterprise customers need to successfully move to a hybrid cloud video surveillance architecture.”

Sipelia Communications Management, the module of Security Center that enables SIP-based communications between operators and intercom devices, has also been enhanced to offer support for cloud-based deployment.

Record Fusion Service

Security Center 5.10 introduces a new no-code solution to connect external data sources to enhance an operator’s situational awareness. The new Record Fusion Service feature offers a simple and fast path to integrate third party data streams from private or partner record publishers. Users can define tailored record types and consume data from a variety of sources including KML, JSON and CSV documents, or otherwise set up a REST application listening point to which these external services can push records.

The Genetec Record Fusion Service can be used across the entire unified platform to enhance awareness and response, provide contextual information on dynamic maps, be visualised in operational dashboards, in investigative reports or in the unified monitoring interface.

The service supports a broad range of applications, from displaying user-defined and filtered information on a map with custom graphical elements through to combining various records from a wide variety of sources to create custom aggregate records that are useful to specific operators or roles.

The Record Fusion Service increases agility, enables highly specific and relevant data to be quickly and easily added to the platform and makes security operators more efficient in accessing timely contextual information.

Mobility features

Security Center 5.10 further taps mobile devices to reinvent the way organisations accomplish routine tasks on-the-go. Genetec Mobile, a unified app that enables users to access cameras, doors and ANPR units from their smart phones, now supports Genetec Mission Control incidents as well as standard operating procedures. This allows end users to trigger or view active incidents on maps or in list format and record incidents in the field to notify colleagues in the Security Operations Centre.

A new specialised portal is also available to help customers manage mustering during evacuations. The Evacuation Assistant app connects to Security Center Synergis (the access control system in Security Center) such that, when an evacuation is triggered, the system automatically starts to monitor the safety status of all personnel and visitors. When people arrive at the safety area or muster point, they can badge their credential at a fixed or mobile reader, notify the ‘muster captain’ that they’re safe or inform them that someone might be at risk. If someone is shown not to have been evacuated, the system will then trigger a response so that security personnel can take immediate action.

*For more information about Security Center 5.10 visit: https://resources.genetec.com/blog/security-center-5-10-is-here

Leave a comment

Filed under Security Matters

Kings Secure Technologies awarded security guarding services contract by international courier Hermes

Security services and solutions provider Kings Secure Technologies has been awarded a contract by courier business Hermes for the provision of security guarding services across its entire UK property estate. 

Throughout an intensive tendering process, Kings Secure Technologies demonstrated its ability to deliver first-class security teams covering all of Hermes’ sites, in turn affording the client complete confidence in service delivery and management. As part of the mix, Kings Secure Technologies will be realising its commitment to continued innovation and improvement.

Commenting on the contract win, Carrie Eastwood (director of security personnel at Kings Secure Technologies) explained to Security Matters: “Hermes UK is an internationally-recognised company and we’re delighted to have been selected to work with them. We now look forward to building a strategic partnership with Hermes and delivering first class security services for the benefit of the company’s operations, personnel and assets.”

John Ferguson, head of loss prevention at Hermes, responded: “This contract award demonstrates that Kings Secure Technologies is continuing to strengthen its positioning the UK security services market. We’re pleased to work with a leading company that values safety and security and continually invests to protect its resources and people.”

Headquartered in West Yorkshire with satellite offices in Scotland, the Midlands, London and the South East, Kings Secure Technologies focuses on delivering cutting-edge innovative solutions that ensure a full end-to-end risk management approach for its clients. 

The company’s Technology Monitoring Centres work in tandem with the DYMENSION data and incident trend app to provide clients with round-the-clock monitoring and intelligence-led analysis and reporting, actively preventing criminal activity at myriad locations across the UK.

Disrupting child exploitation

In parallel, Kings Secure Technologies has recently joined forces with leading children’s charity Barnardo’s to help disrupt child exploitation in the city of Bradford’s night-time economy.

Child exploitation occurs where an individual or group takes advantage of an imbalance of power to coerce, manipulate or otherwise deceive a child or a young person under the age of 18 into sexual or criminal activity. Offenders target children and use emotional, financial or physical power over the child in an effort to abuse them.

Given its extensive network of security officers operating across the UK, Kings Secure Technologies recognised that it could help to prevent child exploitation in Bradford and, on that basis, has linked with Barnardo’s to work the latter’s Trusted Relationship Group Work Programme.

The team from the Trusted Relationship Group Work Programme will be operating alongside Kings Secure Technologies’ security officers, initially in the West Yorkshire region, and teaching them how to look out for the signs of child exploitation, speak out on the matter and adopt a zero tolerance approach.

Kings Security Technologies’ Security Personnel division provides security guarding services on a 24/7/365 basis. Each of its security officers is Security Industry Authority-licensed and trained. They’re often the ‘eyes and ears’ on the ground, with an increased presence during the hours of darkness. It follows that developing the Kings Secure Technologies guarding team member to be fully aware of chiled exploitation is key to the company’s safeguarding efforts.

Tackling the issue

Marianne Wadsworth, who leads on the Trusted Relationship Group Work Programme for Barnardo’s, stated: “Exploitation is occurring. It’s an issue that we can all help to tackle just by opening our eyes and allowing ourselves to really see what’s happening before us and speaking up. The victims of exploitation often don’t recognise they’re being exploited so we should all know the signs to look out for and feel confident to report any concerns.”

Barnardo’s is the UK’s largest children’s charity. Established by Dr Thomas Barnardo, the charity celebrated its 150th Anniversary in 2016. Each day, the organisation works to transform the lives of the UK’s most vulnerable children and, every year, helps thousands of families to build a better future.

Last year, more than 300,000 children, young people and families were supported by Barnardo’s through upwards of 1,000 services across the UK.

The charity works with young carers, care leavers, young people at risk of child sexual exploitation, disabled young people, foster carers and adoptive parents and provides training, skills and parenting classes.

Bob Forsyth, CEO at Kings Secure Technologies, concluded: “Our partnership with Barnardo’s is an exciting development and demonstrates how, as a business working within the night-time economy, we can play an active role in safeguarding children and young people. The training provided by Trusted Relationship Group Work Programme initiates advice, support and guidance on how to spot the signs of child sexual exploitation, child criminal exploitation, county lines, modern slavery and human trafficking. It’s absolutely vital.”

*Further information on the work of Kings Secure Technologies and the breadth of services provided by the company can be found online at www.kingsltd.co.uk

Leave a comment

Filed under Security Matters

Open University bombarded by one million-plus e-mail attacks in 2020

The Open University, which is based in London, was bombarded by 1,191,312 malicious e-mail attacks from January through until September. That’s according to official data obtained by the Parliament Street Think Tank by way of a Freedom of Information request procedure.

The Open University is a higher education institution specialising in distance learning courses, flexible part-time study and open learning for undergraduate and post-graduate courses and qualifications for adults of all ages.

Fortunately, all of the malicious messages – which included spam, malware and phishing attacks – were blocked by the Open University’s servers.

In its response to Parliament Street’s researchers, The Open University revealed that the malicious e-mail attacks were divided equally over the course of the nine-month period under scrutiny, with roughly 132,368 e-mail attacks and spam messages blocked each month.

The data also reveals that 6,804 messages were blocked due to the suspicion of malware and that 16,452 phishing e-mails were detected and blocked.

Abundance of data

Chris Ross, senior vice-president of international sales at Barracuda Networks, commented: “The nature of The Open University, and the fact that a majority of its courses take place online, means that cyber attackers will inevitably attempt to target the abundance of data stored on its servers. Hence the significant quantity of scam attacks facing the institution.”

Ross continued: “To add to this, our recent research revealed that spear phishing attacks are disproportionately targeting educational institutions across the world, with over 3.5 million phishing e-mails hitting over 1,000 global schools and universities from June through until September of this year.”

He added: “While it’s certainly a good thing that The Open University has, so far, managed to successfully protect itself from a data breach, it’s important that security standards are maintained and that the right software and training is constantly updated in order to keep pace with the rapidly changing cyber threatscape. Furthermore, due to the sensitivity of information stored in their servers, educational institutions must ensure that all data is backed up in a third party, encrypted cloud back-up solution which will also enable protection from the growing trend in ransomware attacks facing universities.”

Boosting qualifications

Andy Harcup, vice-president of sales at Absolute Software, informed Security Matters: “As the second national lockdown puts more people out of work and hinders ‘traditional’ education institutions, millions will be looking towards The Open University in an effort to boost their qualifications, retrain in a new career path or learn a new skill. Unfortunately, cyber attackers will attempt to target the onslaught of new personal devices which will soon be added to The Open University’s nationwide network of devices, all of which are likely to be connected, in some way, via shared data storage points and cloud SaaS applications, for example.”

Harcup went on to state: “Therefore, prospective students, and indeed The Open University itself, must ensure that their devices are protected by a sophisticated endpoint security solution which will ensure that a compromised device can still be accessed, controlled or frozen, such that any breached log-in credentials or a stolen device doesn’t necessarily equate to a loss of data.”

Leave a comment

Filed under Security Matters

Hackers impersonate Marks and Spencer CEO Steve Rowe in £35 ‘free’ gift voucher scam

Cyber criminals have launched an audacious online scam designed to trick Marks and Spencer (M&S) customers into handing over confidential data by attempting to impersonate the famous High Street retailer’s CEO Steve Rowe.

The fraudulent adverts, uncovered by the Parliament Street Think Tank’s cyber research team, were launched via social networking site Facebook from an unverified page entitled ‘Marks and Spencer Store’.

Users have been bombarded with adverts showing a man (who’s not Steve Rowe) holding M&S-branded bags accompanied by the message: “Hello everyone. My name is Steve Rowe and I’m the CEO of Marks and Spencer. I’ve an announcement to make. To celebrate our 135th Anniversary, we’re giving EVERYONE who shares and then comments by 11.59 pm tonight one of these mystery bags containing a £35 M&S voucher plus goodies! Make sure you enter here [URL].”

The fake URL takes unsuspecting users to an M&S-branded portal where they’re asked for their name, address, mobile phone number and bank details including sort code and account number in order to ‘enter’ the prize draw.

Around 150 members of the public had identified and reported the scam, which was flagged to consumer groups and raised as an issue on social media.

In a statement, Marks and Spencer commented: “We have been made aware of this advert and it isn’t genuine. Our colleagues are investigating further.”

Expert observations

Cyber security expert Andy Heather, vice-president of Centrify, observed: “With more people than ever committed to online retail shopping due to COVID-19, it’s likely that we’ll see a surge of ‘exclusive’ or ‘one-time only’ deals pop up on social media, via e-mail and through SMS messages over the course of the next few months up until Christmas. Unfortunately, many of these sales and deals, much like this M&S one, will be a scam designed to steal confidential data, such as payment details or log-in credentials.”

Heather continued: “If people may have already fallen victim to a scam of this nature, it’s essential that they take proactive measures to stop these scammers in their tracks. This requires individuals to report these scams to the impersonated brand, freeze bank accounts and change log-in details. It’s very common for attackers to hold on to stolen log-in credentials for months after an attack, waiting for the victim to drop their guard before re-breaking in to other accounts protected by the same password.”

Tim Sadler, CEO at Tessian, explained: “Phishing scams don’t just reside in your Inbox. Hackers are increasingly using social media as another hunting ground for their victims. With the lure of a prize giveaway, cyber criminals are hoping that people will click the URL link to ‘enter’ the competition. Those that do click are led to a malicious website that prompts them to enter valuable personal information and credit card details.”

Sadler concluded: “As we head into the busy pre-Christmas shopping season, we can only expect to see more of these types of ‘sale’ scams emerge online. Treat these posts just like you would any phishing e-mail. Ask yourself if this deal seems legitimate and verify the identity of the person requesting you to take action before clicking on any links. In this instance, the scammers have used a picture of someone who isn’t the CEO of M&S. If you’re still unsure, visit the retailer’s website and official social media channels to cross-check that the deal has been mentioned elsewhere.”

Leave a comment

Filed under Security Matters

96% of UK organisations experience at least one business-impacting cyber attack in past 12 months

Tenable Inc, the cyber exposure company, has published the results of a global industry study of business and security executives that reveals the majority of UK organisations (96% of those surveyed, in fact) have experienced a business-impacting cyber attack in the past 12 months.

The data is drawn from ‘The Rise of the Business-Aligned Security Executive’, a commissioned study of more than 800 global business and cyber security leaders, including 103 respondents from the UK. The survey was conducted by Forrester Consulting on behalf of Tenable.

As cyber criminals continue their relentless attacks, 63% of respondents in the UK have witnessed a dramatic increase in the number of business-impacting cyber episodes over the past two years. Unfortunately, these attacks had damaging effects, with organisations reporting loss of employee data (44%), financial loss or theft (36%) and customer attrition (34%). Some 65% of security leaders in the UK say these attacks also involved operational technology.

Business leaders want a clear picture of how at risk they are and how that risk is changing as they plan and execute business strategies. Only four out of every ten local security leaders say they can answer the fundamental question: “How secure, or at risk, are we?” with a high level of confidence, despite the prevalence of business-impacting cyber attacks.

CyberAttack

Global respondents

Looking at global respondents, fewer than 50% of security leaders said they are framing cyber security threats within the context of a specific business risk. For example, although 96% of respondents had developed response strategies to the COVID-19 pandemic, 75% of business and security leaders admitted their response strategies were only “somewhat” aligned.

Organisations with security and business leaders who are aligned in measuring and managing cyber security as a strategic business risk deliver demonstrable results. Compared to their siloed peers, business-aligned security leaders are:

*Eight times more likely to be highly confident in their ability to report on their organisations’ level of security or risk

*90% are very or completely confident in their ability to demonstrate that cyber security investments are positively impacting business performance compared with 55% of their siloed counterparts

85% have metrics to track cyber security RoI and impact on business performance versus just 25% of their siloed peers

Business-aligned leaders

Those organisations with business-aligned cyber security leaders are also:

*Three times more likely to ensure cyber security objectives are in lock step with business priorities

*Three times more likely to have an holistic understanding of their organisation’s entire attack surface

Three times more likely to use a combination of asset criticality and vulnerability data when prioritising remediation efforts

“In the future, there will be two kinds of CISO — those who align themselves directly with the business and everyone else,” said Renaud Deraison, CTO and co-founder at Tenable. “The only way to thrive in this era of digital acceleration is to bring cyber into every business question, decision and investment. We firmly believe this particular study shows that forward-leaning organisations view cyber security strategy as essential to innovation and that, when security and the business work hand-in-glove, the results can be transformational.”

Leave a comment

Filed under Security Matters

Genetec unveils ‘Innovate Everyday’ webinar series for end users and integrators

Genetec, the developer of unified systems for enhanced security, operations and intelligence, has announced a new series of webinars designed to assist end users and system integrators in navigating these testing times.

The sessions outline ways in which customers from various industries are repurposing their existing physical security systems in order to solve specific pandemic-related issues. In addition, they will cover ways in which Genetec is evolving its own solutions to address critical new requirements.

GenetecWebinar

The details for the upcoming webinars are as follows:

Thursday 16 July

Privacy now and after COVID-19 Amid a public health crisis, the global pandemic is raising questions about privacy. How can technology help?

Tuesday 21 July

Physical security innovations to help during the pandemic In this session, experts will discuss the new reality and how technology is being developed and deployed

Tuesday 4 August

Delivering new innovations Experts from Genetec, Quanergy and HID will discuss collaborative innovations that are supporting end users in the current environment

Tuesday 18 August

Identity as the new perimeter Experts will discuss why identity is now the backbone to infrastructure management and the enforcement of security policies

Wednesday 26 August

Machine Learning: Making sense of data Data scientists will explain the use of machine learning to improve product performance, give users greater insights into their physical security data and enable organisations to more effectively automate their processes

*For more information or to register for any of these webinars visit https://www.genetec.com/innovate-everyday

**Watch the promotional video here: https://www.youtube.com/watch?time_continue=1&v=auYzGXGbxgE&feature=emb_logo

Leave a comment

Filed under Security Matters

WatchGuard report finds two-thirds of malware to be encrypted

WatchGuard Technologies’ latest Internet Security Report shows that 67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and that 72% of encrypted malware was classified as zero day, so on that basis would have evaded signature-based anti-virus protection.

These findings show that, without HTTPS inspection of encrypted traffic and advanced behaviour-based threat detection and response, organisations are missing up to two-thirds of incoming threats. The report also highlights the finding that the UK was a top target for cyber criminals in Q1, earning a spot in the Top Three countries for the five most widespread network attacks.

“Some organisations are reluctant to set up HTTPS inspection due to the extra work involved, but our threat data clearly shows that a majority of malware is delivered through encrypted connections and that letting traffic go uninspected is simply no longer an option,” said Corey Nachreiner, chief technology officer at WatchGuard. “As malware continues to become more advanced and evasive, the only reliable approach towards defence is implementing a set of layered security services, including advanced threat detection methods and HTTPS inspection.”

Malware

Key findings

Other key findings from WatchGuard’s latest Internet Security Report include:

Monero cryptominers surge in popularity Five of the Top Ten domains distributing malware in Q1 (identified by WatchGuard’s DNS filtering service DNSWatch) either hosted or controlled Monero cryptominers. This sudden jump in cryptominer popularity could simply be due to its utility. Adding a cryptomining module to malware is an easy way for online criminals to generate passive income

Flawed-Ammyy and Cryxos malware variants join top lists The Cryxos trojan was third on WatchGuard’s Top Five encrypted malware list and also third on its Top Five most widespread malware detections list, primarily targeting Hong Kong. It’s delivered as an e-mail attachment disguised as an invoice and will ask the user to enter their e-mail and password which it stores. Flawed-Ammyy is a support scam where the attacker uses the Ammyy Admin support software to gain remote access to the victim’s computer

Three-year-old Adobe vulnerability appears in top network attacks An Adobe Acrobat Reader exploit that was patched in August 2017 appeared in WatchGuard’s top network attacks list for the first time in Q1 of this year. This vulnerability resurfacing several years after being discovered and resolved illustrates the importance of regularly patching and updating systems

Mapp Engage, AT&T and Bet365 targeted with spear phishing campaigns Three new domains hosting phishing campaigns appeared on WatchGuard’s Top Ten list in Q1 2020. They impersonated digital marketing and analytics product Mapp Engage, online betting platform Bet365 (this campaign was in Chinese) and an AT&T login page (this campaign is no longer active at the time of the report’s publication)

COVID-19 impact Q1 2020 was only the start of the massive changes to the cyber threat landscape brought on by the COVID-19 pandemic. Even in the first three months of 2020, WatchGuard still saw a massive rise in remote workers and attacks targeting individuals

Malware hits and network attacks decline Overall, there were 6.9% fewer malware hits and 11.6% fewer network attacks in Q1, despite a 9% increase in the number of Fireboxes contributing data. This could be attributed to fewer potential targets operating within the traditional network perimeter with worldwide work-from-home policies in full force during the COVID-19 pandemic

Malware2

Anonymised data

The findings in WatchGuard’s Internet Security Reports are drawn from anonymised Firebox Feed data from active WatchGuard appliances whose owners have opted in to share data to support the Threat Lab’s research efforts. Over 44,000 appliances worldwide contribute threat intelligence data to the report. In Q1 2020, they blocked over 32,148,519 malware variants in total (730 samples per device) and more than 1,660,000 network attacks (38 attacks per device).

The complete report includes key defensive Best Practices that organisations of all sizes can use to protect themselves in today’s threat landscape and a detailed analysis of how the COVID-19 pandemic and associated shift to working from home affected the cyber security landscape.

*To view the full report visit Internet Security Report for Q1 2020

Leave a comment

Filed under Security Matters

Notting Hill Genesis surveillance upgrade project witnesses Cloudview and Amthal Fire & Security working in tandem

Amthal Fire & Security has been working closely with secure cloud CCTV specialist Cloudview in order to upgrade legacy network surveillance systems and realise smart cloud-based and, importantly, compliant solutions for the benefit of staff and residents involved with Notting Hill Genesis. 

Notting Hill Genesis is one of the largest housing associations in London and the South East, with its head office at Kings Cross and five further site locations requiring high quality protection for more than 1,500 office-based members of staff.

Amthal Fire & Security has been working closely with Cloudview to take responsibility for security maintenance across the office portfolio, alongside ensuring the safety and security of residents housed in both new and existing dwellings.

To ensure efficiency savings, compliance and smart capability when it comes to CCTV, Notting Hill Genesis’ visual data partner Cloudview has supplied its specialist systems for Amthal Fire & Security engineers to install across the office and development network.  The new system removes the need for DVRs and allows authorised personnel instant and secure remote access for the management of evidential footage stored as required in case of a threat or an emergency scenario.

Image Useage

Compliance with the GDPR

Suki Kahlon, office services manager for central services at Notting Hill Genesis, informed Security Matters: “The need to update CCTV systems for ensuring compliance with the General Data Protection Regulation (GDPR) was of paramount importance, both for the Notting Hill Genesis team and also for our residents and their safety. Partnering with Cloudview and, later on, Amthal Fire & Security has been of great benefit. They understand our working environment.”

Kahlon continued: “Both companies operated in such a way as to enable a scalable upgrade programme of works across our office base and various housing developments. Essentially, our ambition is that wherever we have CCTV systems in place, we want to upgrade to the cloud and bring our networks together in a centrally managed visual data infrastructure. The Cloudview solution has been well received by building managers and authorised personnel.”

To date, Amthal Fire & Security’s installation and maintenance teams have completed install works at the head office in Kings Cross and at the West London office in Hammersmith, in addition to new housing development connections.

Visual data

The new surveillance technology is created to offer alerts when instant action is required and based on what’s identified as a threat. Visual data can be accessed anywhere at any time and on any device. It can also be shared immediately and saved for up to 12 months if required, with 30-day delete options as standard in order to comply with the GDPR.

Crucially, the data is only accessible to authorised personnel, all of whom have audit control capability for full compliance.

Stephen Bates, CEO at Cloudview, observed: “Notting Hill Genesis is committed to providing safe and secure communities in which residents can thrive. Equally, the client is very clear on its responsibilities to its team members who are at the heart of these communities. The need for smart surveillance technology that can be centrally managed is integral. We were delighted to offer a solution that could bring these requirements together. With the help of Amthal Fire & Security, we have enabled a seamless installation process between all Notting Hill Genesis’ offices and housing developments.”

NHGCloudview

Phil Bryant, manager of the strategic accounts team at Amthal Fire & Security, added: “At the heart of social enterprise is the overriding need to create homes and communities in which residents want to live, with management taken care of by the dedicated local teams employed by Notting Hill Genesis. The organisation now has smart systems in place to ensure ongoing safety and security.”

Bryant continued: “The Cloudview system installed by Amthal Fire & Security, with both of us operating in constant collaboration, has proven to offer best value and significant efficiency savings that can be maintained to ensure ongoing compliance and simple maintenance plans. It also allows Notting Hill Genesis staff to have a much more reactive and instant approach to any threat identified, thereby affording total peace of mind.”

Leave a comment

Filed under Security Matters