Fundamentals of a Strong Preparedness Plan | #TpromoCom #Preparedness #Plan | Ensuring continuous business operations and the well-being of your people and facilities requires focused attention on crisis management, risk management, emergency response and business continuity management. Learn more about the fundamentals of making sure your business and people are prepared for the unexpected with this guide to business continuity management best practices.
Iranians targeted by smartphone surveillance operation: report | #TpromoCom #Smartphone #Spy #Iran | Israeli cybersecurity firm Check Point on Friday said a surveillance operation had targeted the smartphones of several hundred Iranian citizens via malware implanted in their handsets, indicating Tehran was responsible.
“This is the first time to our knowledge that a technical analysistechnique has highlighted the fact a government has led a cyberespionage campaign on smartphones,” the firm’s vice-president for Europe, Thierry Karsenti, told AFP.
To read the remainder of this informative news article, click here.
Air Canada Suffers Data Breach — 20,000 Mobile App Users Affected | #TpromoCom #CyberSecurity #Data #Breach | Air Canada has confirmed a data breach that may have affected about 20,000 customers of its 1.7 million mobile app users.
The company said it had “detected unusual log-in behavior” on its mobile app between August 22 and 24, during which the personal information for some of its customers “may potentially have been improperly accessed.”
To read the remainder of this news article, click here.
Join GKO on Crime Prevention for the latest news and information | #TpromoCom #GKO #Crime #Prevention | Looking to improve security at home? Interested in learning more about crime prevention? The GKO on Crime Prevention group on Facebook offers news, information, and discussion on the subject of personal safety as well as the prevention of burglaries and robberies at home, in the workplace, and while traveling.
The group provides helpful information you can use to fight crime at home, while traveling, and at the office. Scams and general crime prevention information is commonly provided. You don’t need permission to post if you have a question or information to share. We’re especially interested in hearing any story you have to share. -Al Colombo
Martin Gren on OEM and cyber security | #TpromoCom #OEM #CyberSecurity #CCTV | In this Detektor TV Magazine video clip, Axis co-founder Martin Gren says he believes OEM will come to an end because of cyber security issues. He also gives his view on Axis’ biggest challenge, video surveillance and smart cities, and more.
“If you are a big integrator and you OEM a camera and put your name on it, then you probably have put some extensive work on skinning, to make sure the camera appears to be yours, and then when there is a cyber security upgrade, you need to renegotiate with the original manufacturer and have it to do the skinning once you have discovered a bug”, he says.
To read the remainder of this interesting news article, click here.
Editor’s Note:There are those on the political Left who would have us all believe that the world is now a kinder, more gentler place than it was in the 1930s and 1940s, but the truth of the matter is, it’s actually a more dangerous place simply because of the convenience of technology. We must continue to be ever vigilant and watchful with regards to hacking as well as the deliberate placement of backdoors in software, as was recently discovered with regards to certain makes of cameras manufactured by certain Asian companies. –Al Colombo
Vulnerable Smart City Devices Can Be Exploited To Cause Panic, Chaos | #TpromoCom #CyberSecurity #Hackers #Hacker #SmartCity | False alerts about floods, radiation levels are just some of the ways attackers can abuse weakly protected IoT devices, researchers warn.
To read the remainder of this news article, click here.
Al’s Viewpoint: Hackers are quick to take advantage of any and all vulnerabilities where it comes to any and everything “Internet.” IoT is a godsend, and yet it’s a curse. I continue to get notices of impending doom, weather emergencies, etc. on my dumbphone and I ignore them all. Yes, at my own peril. But I also listen to the radio (when I’m not on Internet Radio). Life is too short to live it in fear. Know the limits of the tech as well as the vulnerabilities and risks and use it with all of this in mind. –Al Colombo
Internet of Things (IoT) Security in Smart Home Devices | #TpromoCom #IoT #Hacker #Hackers | 25 insights from testing 50 devices on the market in 2015. Download this report now: click here. (scroll down for more)
The Internet of Things (IoT) refers to devices that can send or receive data automatically, without being prompted by human interaction. Examples are cars that notify drivers of low tire pressure, a security system notifying the home owner, or smart thermostats maintaining optimum home temperature based on outside weather.
These devices have very low security protocols. While attackers or hackers have not found a way to profit from taking control of devices yet, it is only a matter of time. The most common access points are through the cloud or the home Wi-Fi Ethernet network. Device owners can protect themselves by:
Ensuring strong security protocols and encryption on the home network
Changing default passwords
Disabling unneeded features or features not in use
How to mitigate IoT threats to video surveillance systems | #TpromoCom #IoT #Hacker #Hackers #CyberSecurity | as device connectivity continues to define the digital age, monitoring the technology that monitors us is demanding stricter rules and protocols to ensure risk is mitigated, threats are dealt with in a proactive manner and global laws are managed. (read more)