EN-Product Brochures

Security of Security Brochure

Issue link: https://resources.genetec.com/i/880637

Contents of this Issue

Navigation

Page 2 of 5

Cybercriminals can cause massive disruption to the activities of both organizations and governments. In 2017, a major ransomware attack, known as WannaCry, affected people and organizations around the globe. It targeted systems running common, but outdated software. As a result, more than 230,000 computers in 15 countries were locked. To regain access to their data, organizations and users had to pay a large sum to the perpetrators. In many hospitals, medical records became encrypted, disrupting operations and threatening patient lives. Emboldened cybercriminals have also increased the scope of their attacks, targeting private security cameras to access live video. While some of these attacks exploit simple vulnerabilities, such as default manufacturer passwords, others are more sophisticated and complex. Whether at work or at home, preventing strangers from accessing your cameras is no longer a simple affair. With greater connectivity of systems over the Internet, a vulnerable device can become a gateway to your organization's data and sensitive information. Now, when you protect your physical security system, you are also working to safeguard all of the other systems and the information that is connected to the network. To achieve this, you need a new approach–a defense in depth strategy. The growing risks of an interconnected world Developing a defense in depth strategy As with any interconnected entity, security systems can be targeted. Hacking a security system can take any number of forms, including brute-force, packet-sniffing, and man-in-the-middle attacks. In some cases, cybercriminals are able to listen in and alter communications, even while users believe their system is secure. This variety of attack strategies requires an equal variety of defense layers. At Genetec, we provide secure, audited and compliant solutions that help you protect privacy without compromising security. We help you incorporate multiple and varied lines of defense, otherwise known as a defense in depth cybersecurity strategy, to face common and emerging threats, and secure your environment. Data captured by our unified security system for management, analysis, and storage, is protected by strong encryption, authentication, and authorization methods.

Articles in this issue

view archives of EN-Product Brochures - Security of Security Brochure