Are there Holes in Healthcare Cybersecurity?

Are there Holes in Healthcare Cybersecurity?

October is Cybersecurity Awareness Month

What draws ten times more money on the black market than personal information stolen from credit cards? Healthcare records. It’s no surprise then that 41% of cybersecurity breaches were targeted towards the healthcare industry last year. Broken down, the data shows that healthcare organizations suffered a disproportionate 32,000 attacks per day per organization. This is compared to 14,300 per day per organization sustained by other industries, and makes healthcare the most vulnerable industry, with five times more total breaches than other industries.

The healthcare industry is the second biggest industry in the U.S., and as its professionals try to enhance patient care and navigate changing regulatory landscapes, healthcare cybersecurity is often relegated to the back burner. What makes this situation particularly disturbing is that the healthcare industry has the most to lose from these types of attacks; in addition to the monetary losses, cyber attacks targeting medical devices can become a real matter of life and death.

This issue is further compounded by the fact that the average healthcare cybersecurity budget is only about half that of other industries, and employees may be motivated by money to share sensitive information. A recent Accenture study revealed that “18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000.”

What’s at Risk?

These attacks threaten patient’s identities and financial well-being – and they can also affect their health. In 2016, hackers targeted the large Maryland-based healthcare system, MedStar Health, with ransomware. MedStar had to shut off its email and patient record database. Even more ominous, it couldn’t provide radiation treatments to patients for several days, a potentially life threatening situation.

Criminals can access other IoMT (Internet of Medical Things) devices connected to a network, including medical lasers, X-ray and MRI machines, ventilators, pacemakers, electric wheelchairs and other critical equipment. Since these devices are comprised of various parts and software from a number of different companies that may not focus on security, they are especially at risk. Hackers can even target specific individuals, as was the case of former U.S. VP Dick Cheney, who received threats warning of an attack on his pacemaker. His doctors had to disable the device.

How Are Criminals Breaching the Networks?

Many hackers use emails to access healthcare networks:

  • Ransomware is delivered through emails, accesses other computers through the network and blocks access to data until the ransom is paid.
  • Malicious URLs also arrive through email and look as if they were sent by reputable companies. They either download malware or gather sensitive information when selected.
  • Malicious attachments can also come through email and look convincing. They can send malware or other macros that install viruses, record keystrokes or even provide remote access to computers and networks.
  • Business emails can be used for a type of targeted “spear-phishing” known as “whaling” to create emails that appear to have come from within the organization or another trusted sender. Hackers will send an email to someone with access to money or sensitive information posing as their boss or a higher-level colleague. They’ll prep with a personal email first (with information gleaned online) and then request an action with a sense of immediacy.
  • An internal threat can be intentionally malicious or just imprudent. An employee bent on doing wrong can wreak havoc by hacking into the network. Or, an innocent insider may mistakenly send sensitive information to the wrong person, fail to encrypt it, neglect to properly log out of an accessible computer or even browse an unprotected website.
  • According to the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, Ponemon Institute conducted in May 2016, 90% of healthcare organizations weathered a data breach in 2016 and only 50% were from a coordinated attack, so it can be safely surmised that many came from careless mistakes.

Smart Healthcare Cybersecurity Solutions

To counteract these threats, those in the healthcare industry can take several steps. By viewing every identity as they would a physical security perimeter, they can focus on validating every access request on every device, verifying the identify of every user and limiting access and privilege. On the network front, healthcare organizations must secure their networks and extend this to the cloud. Any sensitive information that is sent must also be encrypted. Additionally, organizations can implement machine learning to monitor user behavior patterns and spot anomalies that reveal hacker behavior.

Healthcare organizations must also move faster and provide more thorough software patches and updates. They can deploy threat intelligence and automation as well as offer critical cyber-awareness training to employees to help them manage email, social media and other entry points.

If you’re a healthcare professional and would like to learn about how to better secure your data, you can read more here.

 

6 Current Cyber Threats and How to Combat Them

6 Current Cyber Threats and How to Combat Them

October is Cybersecurity Awareness Month

Cybersecurity continues to be a vexing concern for security professionals. As the industry focuses on cybersecurity awareness month this October, it’s an opportune time to get up to speed on the latest cyber threats as well as take measures now to combat them.

1. Cyber-Physical Security Vulnerabilities

These are some of the most critical current cyber threats, targeted towards infrastructure, power grids and transportation, including older ships, trains or planes that are especially vulnerable to cyber attacks. Whether the attacks wreak immediate destruction or try to extract ransomware for a “cure,” these threats are deadly and real.

Make sure that the critical software protecting your physical security is 100% up-to-date and monitored 24/7.

2. Big Data Breaches

Where there are large collections of people’s sensitive personal information, there will always be thieves attempting to snatch it. Data breaches have increasingly plagued companies with bigger and bigger exploits – and have exposed almost half of the U.S. population to the dangers of identity and other forms of theft. Just this week, Google+ revealed that they suffered a breach that affected approximately 500,000 users back in March. The social network is now shut down.

Companies that capture users’ web behavior may be especially at risk because these companies aren’t subject to the strict regulations that keep banks and other companies with sensitive information in line. Author of Future Crimes, Marc Goodman, says, “When one leaks, all hell will break loose.”

Avoid this issue and keep your website secure with the latest security tools and a team of experts.

3. Rampant Ransomware

Cybercriminals are more emboldened by their ransomware attacks, which are estimated to have ratcheted up about $5 billion in damages in 2017. While cities like DC and Atlanta have managed to thwart criminal efforts and get their systems up and running again without paying a ransom, many companies are forced to acquiesce to the hackers to get their valuable functionality back. Although backing information up on the cloud is a good solution, the cloud is not immune to ransomware attacks either. One of the most powerful malware strains, Petya, rocketed through people’s backups on Dropbox too.

Make sure to back up your data continuously to a safe place like an unconnected hard drive or a secure site in the cloud.

4. Cryptocurrency Pirating

Another way for hackers to gain access is through cryptojacking, or attacking hardware in order to mine cryptocurrency. Criminals create a script that resides within a vulnerable website, and unprotected computers then download the script. In addition to stealing money, criminals also steal valuable computer processing power, since the computers that house cryptocurrency are very powerful. This latest cyber threat fast approaches the popularity of ransomware, and makes hospitals, banks, airports, and other important entities vulnerable targets.

To counter this threat, invest in good anti-virus and anti-malware solutions and always keep your software up to date, as well as your browser.

5. Using AI for No Good

AI provides criminals with an effective tool to automate attacks and expand their coverage of targets. With software that easily mimics human writing, machines can continually spear phish prospective victims, directing targeted emails or alerts that trick people into downloading malware or sharing their important data. As these AI strategies become more sophisticated, they’ll also get better at tricking the “sandboxes” or security programs set up to deter them.

To protect your organization against these threats, education is key. Make sure to let all employees know what these emails look like, and always be cautious when opening an attachment from someone you don’t know.

6. Smart Phones Shipping with Issues

In recent years, hackers have started to program malware into phones before they even ship to the U.S. Since phones have become such rich repositories of our both our work and personal lives, this clever strategy capitalizes on a large amount of sensitive information. This year, the banking Trojan called Triada was embedded in dozens of low-cost Android phones.

If the malware wasn’t built in, hackers are making it easy to add to your phone. Malicious apps are everywhere. Last year, 700,000 “problematic” apps cropped up in the 3.5 million apps available through the Google Play Store. These apps could phish for information, steal information, intercept texts or even duplicate another app.

Be certain that you know what you’re downloading, and avoid buying cheaper phone models that you aren’t as familiar with.

Have You Secured Your Company Against These Threats?

Cyber threats are proliferating, but security professionals have the tools to thwart them. IST’s cybersecurity team deploys the latest solutions in this ongoing arms race against current cyber threats, both for the government and corporate sectors. Contact us here to learn more.

Don’t Miss Our Free “New Technology Forum”

Periodically, IST hosts complimentary informational workshops to help you keep your business up to speed on the latest in security technology, to answer your security related questions and to give you a chance to explore ideas and network with other professionals in the industry.

Our next event is slated for Thursday, October 25th at our offices in Roanoke. It will run from 10am – 2pm, and you are welcome to stay for any amount of time. We’ll have coffee and bagels ready for you in the morning, and then serve lunch between 12-1pm. In the meantime, you’ll be able to hear about the latest breakthroughs in access control and video security with top vendors Lenel, Milestone and Assa Abbloy – and have access to new one-on-one product demonstrations and discussions with industry leaders.

Get Up to Date in Less than a Day

Encryption and tokenization are emerging as powerful ways to combat possible data breaches, even down to the field and subfield levels. These tools prevent data monetization, enable secure movement of data within an organization and ensure compliance with protect payment card information (PCI), personally identifiable information (PII) and protected health information (PHI).

How to Keep Your Staff Up to Date?

These educational open houses are the perfect opportunity to stay abreast of the latest technology trends and features to help your business stay ahead of the curve. Rather than trying to absorb the never-ending industry news and blogs all at once, you’ll have knowledgeable vendors distilling the most important details in the space of a few hours. If you’re already caught up but want to get more customized information or connect with other industry professionals, this open house will provide that too.

Lenel will headline the event. As a global provider of open-platform security solutions with integrated access controls and video management, Lenel offers a number of proven security products to protect companies in any industry. Web and mobile friendly apps and interfaces make their cameras and access controls simple to manage from anywhere. Both the education and government fields greatly benefit from their systems.

Milestone has been recognized as the number one video management system. Its solutions work seamlessly with Lenel’s to provide video management software, network video recorders and add–ons like screen recorders, video walls, transaction verification software and more—to any organization requiring security services, from the smallest retail shop to multinational corporations, and across industries.

Assa Abbloy is a worldwide leader in door opening solutions, including electrical and electromechanical locking, access control, identification technology, entrance automation, security doors and more. The company has the largest number of installed door opening solutions in the world, and provides comprehensive consultative services as well as the prolific R&D that drives their constant innovations.

All three companies will be on hand along with our team at IST to help answer your specific questions. Come ready for a few hours of deep learning and productive networking.

Put the New Technology Forum on your calendar for October 25th and get back on the cutting edge of security in just a few hours. We’ll see you there.

The Countdown to GSX Begins

Would you like to immerse yourself in one of the most innovative security industry events in the world? Join us at the Global Security Exchange (GSX) from September 23rd through September 27th. Formerly called the ASIS Annual Seminar and Exhibits, it’s one of the biggest and most influential security events of the year. GSX brings together an international audience to share ideas, explore options and invest in solutions for the security industry. It’s all housed at the 3.2 million square foot Las Vegas Convention Center (LVCC).

With the recent name change, the event has been significantly reimagined for an entirely new trade show experience – with immersive and innovative experiential learning opportunities. Attendees will see frontier technologies in action and learn how cryptocurrencies and AI/VR/AR are revamping and reshaping entire industries.

New This Year

The exhibition hall will include three new distinct areas that make up a special “learning lab,” designed to explore an entire range of security options, including robotics, immersive reality, access control, alarms and more. They are:

  • X Stage, where GSX will introduce entrepreneurs, thinkers and business leaders who are challenging the way we think about the intersection of security and technology. The event’s signature theater will feature leaders including Ty Richmond, CPP, President of Universal Services of America and Air Force Major General Bradley Spacy.
  • XPerience Stage, where attendees will have the opportunity to hear case studies and other demonstrated solutions to their most pressing security questions. This format will facilitate the transfer of knowledge and best practices.
  • Xcelerated Exchange Stage, where a panel of experts, innovators and business leaders will engage in a town hall discussion to unpack the latest and most critical security topics.

Additionally, participants can visit the GSX D3 Xperience to try hands-on demos and learn more about drones, droids and anti-UAS defense systems.

ASIS, InfraGard and ISSA’s experts will lead the overall conversation. Attendees can choose from over 300 information sessions, all designed to capture the latest trends and help them take their security to the next level. They’ll dive into subjects ranging from augmented reality to workplace violence to cybercrime to surveillance & counter surveillance to the Iot to many, many more. They’ll learn cutting edge strategies to master the changing security landscape. They’ll be prepared to face and overcome the next generation of threats.

Over 550 exhibitors will be on hand to showcase their products and bring event-goers up to speed on the most exciting new introductions to the marketplace. More than 22,000 professionals representing 100+ countries will be looking to make connections and find business opportunities.

Be one of them! IST will be attending, and we welcome the chance to meet with you there.

A few quick facts about the event:

  • GSX is the most respected and comprehensive event in the industry. The show has grown 12% in the number of exhibiting companies over the past three years—and they’re currently tracking 4% ahead of last year.
  • More than 21% of buyers are from outside the U.S., and that number is projected to increase.
  • ASIS provides trusted information, insights, and peer support to tens of thousands of global security professionals. GSX is their go-to destination for networking, education and marketplace solutions.

Take advantage of the free expo-only pass if you register by September 22. As you plan for the event, be sure to check the GSX Community page, which provides local Las Vegas information for your stay, including tips on where to host business dinners and other insider information.

We’re looking forward to this game-changing event. Join us!

Emerging Security Technologies and How to Keep Staff Up-to-Date In An Ever-Changing World

Staying on top of new technologies can be a full time commitment—one that’s often easier to relegate to a future time. While in the short run it may be more efficient to push these efforts to a later date, the effects of not being in the know will affect your organization’s long term safety, especially when it comes to security technology.

In the security technology arena, the forces of good and evil continue to play a dangerous game where each tries to stay a step ahead. Fortunately, “white hat” security professionals are gaining the upper hand with new strategies.

Here are four emerging security technologies to keep on your radar:

1. Authentication is Baked into Hardware

This is not a new concept, but it will be adopted on a larger scale in the coming quarters. The three components of authentication include “what a user knows” (usually a password), “who they are” (usually a username) and “what they have” (usually a token). By making the “what they have” piece the device itself, then your laptop, desktop and mobile device, outfitted with an Intel chip, will have “baked in authentication.” As we increasingly incorporate the IoT into our offices as well, these devices will also be able to authenticate from their hardware.

2. Advanced Analytics Step up Security

Since information security professionals see user behavior as one of their most vexing and hard-to-spot concerns, they are staying ahead of would-be hackers with user and entity behavior analytics (UEBA), which identify anomalous online behavior patterns. User behavior analytics (UBA) detect if someone’s username and password have been stolen by comparing past to present online behavior. They can also compare behavior with others in a similar position, like a comparably titled manager or someone in the same department. This is called “peer analysis.” Deep learning algorithms in AI or machine learning also discover other irregular behavior patterns that adversely affect the organization. For instance, the software examines “entities” like a data center, rather than users.

3. The Cloud Gets Bigger and Stronger

The cloud is becoming bigger and has earned a reputation for tighter security. As more traditionally on-premise functions migrate to the cloud, virtualized security hardware, virtualized firewalls and virtualized intrusion detection and prevention systems will move as well.

4. Smarter Breach Prevention Develops

Encryption and tokenization are emerging as powerful ways to combat possible data breaches, even down to the field and subfield levels. These tools prevent data monetization, enable secure movement of data within an organization and ensure compliance with protect payment card information (PCI), personally identifiable information (PII) and protected health information (PHI).

How to Keep Your Staff Up to Date?

With these and other technologies creating an ever-evolving learning curve, the following steps can streamline your education process. By devoting a little time consistently to learning and mastering the technology, you can stay on top. Try this strategy:

1. Map Out Your Needs

Start by clearly identifying your needs, whether they’re effective communications, streamlined production tools, or others. List the items that accomplish these goals—hardware like phones, laptops, and the computer network. Then list how you use these items—like the need for weekly meetings or even better access to a spreadsheet.

2. Take Inventory

What’s working right now and what’s not? Are your software systems in sync? Do you have the latest updates? Do a little research online through resources like TechRadar and CNET and take advantage of available training sessions to stay up to date.

3. Prioritize

Decide which technology gives you the best return on your investment.

4. Dedicate Time for the Technology

If you set a regular time to tackle the technology, you can better manage what can seem like an overwhelming amount of work. Keep up to speed with news sources like Flipboard’s technology category and keep an eye on those starting the new technologies, like VCs, incubators and startups. Whether you have someone dedicated to this or you do this on your own, make sure to check in regularly to break it down into manageable actions.

Following these simple steps and making technology a weekly priority will help keep a your security in check. We’re a deep resource too, so please check our website for new and emerging security technology, and consider attending any upcoming events that make sense for your organization. Time spent keeping up with technology is time well spent, period.

What Is a Security Systems Integrator and Why Does Your Business Need One?

What Is a Security Systems Integrator and Why Does Your Business Need One?

Sometimes there’s confusion around what today’s security systems integrator looks like. So, let’s clear it up. A security integrator essentially links various subsystems to provide security throughout your organization. These include physical as well as cyber protections, including access control like doors, locks, gates and others; video surveillance systems; lighting; emergency notification systems; and network security. Most integrators can install hardware, software, networks and hybrid IT solutions, as well as specialized security equipment.

Why Do You Need a Systems Integrator?

Unfortunately, cyber crime is on the rise. Physical violence at the workplace is also a real threat, especially for certain industries. As the cyber and physical continue to converge through the Internet of Things (IoT), the risks grow graver. Power plants and other utilities can be made vulnerable by unsafe software, hospitals’ sensitive patient information can be hacked and used for criminal activities, ransomware is rampant. No one is safe if they’re connected. If you use email, keep any type of digital records, or rely on your network for business, you should be thinking about security.

Fortunately, security systems integrators can help.

What Does a Security Systems Integrator Do?

Security systems integrators secure people, data and property, but their level of service can vary widely. Some deliver “off-the-shelf” solutions and install them for you. Others go beyond this to manage the entire process, starting with a recommended security plan, moving through installation and implementation, testing and finally management and maintenance. This is known as the full lifecycle. These higher qualified providers can custom-build a security plan for you, and will generally follow these steps:

  1. Provide an initial assessment of your security needs
  2. Design a holistic security system to address these needs
  3. Install the software, hardware, networks or other required equipment
  4. Custom create other systems when needed
  5. Provide training to those managing the system on your end
  6. Offer ongoing maintenance, assessments, upgrades and service

Whenever possible, it’s smart to partner with a full-service systems integrator. Since they’re responsible for ongoing maintenance and service, they take ownership of the entire system and have a vested interest in providing excellent services. With one team managing the entire lifecycle of your systems, you’ll also avoid the finger pointing and miscommunication that can plague a team of multiple vendors. Also, a partnership provides valuable continuity throughout the project, so you’ll ensure that your integrator is very familiar with your company’s ongoing needs.

What to Look for In a Systems Integrator

Ask yourself these important questions as you conduct your search:

  • Are they a good cultural fit? Do your priorities align? Are you comfortable with them?
  • How about their services? They may match your objectives now, but what about in the future?
  • Are they in the know? Since threats are proliferating faster than ever, the means to counter them are as well. Find a systems integrator up on the latest systems and ensure they’re vendor agnostic, so they can provide smart and reliable recommendations.
  • Are they experts at efficiency? Bringing multiple systems together means there are opportunities to create higher efficiencies. A security systems integrator can link the lighting with access control, so that when fewer access cards are swiped in one area of a building, the lights can be adjusted accordingly, saving energy and money.
  • Are they IT smart? As the physical world collides with the IT world, it’s critical to have a deep understanding of coding, programming, troubleshooting and ongoing maintenance. The Internet of Things means that everything is now connected so everything is now vulnerable. Are they prepared?
  • Are they third-party verified? Do they have the important certifications? SSAE16 and ISO-certified data centers help you achieve compliance for HIPAA, SOX, and PCI DSS.
  • Do their employees have certifications? Certifications show dedication to excellence.
  • How trustworthy are their employees? What types of screening do they do?
  • What are their manufacturer relationships? Providers with strong partnerships can resolve issues faster. Check their partner status, certifications and direct access to manufacturers’ L3 engineers.
  • How secure is their datacenter? Do they have biometric authentication, 24/7 in-person and video monitoring, and user records? How about full redundancy and disaster recovery systems?
  • How do they manage their daily relationships? Do they have a portal for daily security updates, service level reports, and troubleshooting requests, as well as communication hubs for feedback and best practices?

There are many security systems integrators out there. Take your time finding the one that works best for you. Ponemon Institute tells us that in 2017 an average data breach cost $3.5 million, and there’s a 27% chance a U.S. company will experience a breach in the next 24 months. The cost will be between $1.1M and $3.8M per incident.

Your security is worth it. We’d be happy to talk with you when you’re ready. We’re the largest independent security integrator in the DC region, with a rapidly expanding presence in the mid-Atlantic area. For over 20 years, we’ve combined IT and physical security to keep your people, property, and data safe. See how we can help you secure your enterprise.

 

6 Reasons Why Your Business Needs a Video Security System

6 Reasons Why Your Business Needs a Video Security System

Every year, U.S. retailers lose $50 billion due to theft and employee wrongdoing. According to the National Retail Federation (NRF®), more than nine out of ten retailers have experienced organized retail crimes (ORC) in the past year, with a hefty price tag of about $726,351 per each $1 billion in sales. In many cases, a video security system could have helped companies avoid these devastating losses.

Whether your business includes retail stores, corporate offices, medical facilities or any other physical space, threats to your people and property are both financially and emotionally debilitating. With a business video security system, you can ensure safety for your staff, equipment and other valuable assets for a relatively low investment. And as the technology for business video security systems increases in sophistication and decreases in price, it’s easier than ever to get connected.

Here are six important reasons why your business needs a video security system:

1. Keep Employees and Customers Safe

The mere presence of surveillance systems can significantly deter wrongdoing. In fact, the UNC Charlotte Criminal Justice and Criminology department recently discovered that 60% of convicted burglars would check for security systems before committing a burglary and 40% would actually look for another target if they saw such a system. Cameras work.

In addition to discouraging criminals, cameras used to provide access control ensure that only approved people enter your facility. Cameras have excellent night vision, so nighttime workers can feel secure, too. And with remote monitoring, it’s easy to see your space (and multiple spaces) from a mobile device from any location.

If someone does attempt a break-in, you can proactively address the situation in real time. If an accident occurs, you can provide help right away. In many industries, state and federal laws mandate monitoring to keep employees safe.

2. Defuse Internal Issues

Security systems help resolve internal issues, too. Whether a customer claims he was treated unfairly, an employee is embezzling money, or a fight breaks out in the break room, these “eyes in the sky” can provide a record of the incident for future resolution. OSHA reported that there were 4,679 fatal workplace injuries in the U.S. in 2014. With a video security system providing vigilance, many of these tragedies could have been prevented.

3. Capture Critical Evidence

Since IP camera resolution qualities have increased in recent years, digital recordings are effective evidence if you need to prove an incident. You can also create a valuable archive of digital information on a server, hard drive or NVR for the future, should you need to analyze any past events. Since they’re digital, they’re very easy to search.

4. Enhance Your Customers’ Experience

The latest video equipment can do more than just record; it can actually analyze customer behavior. This valuable customer loyalty tool helps you track customer movements throughout your store or facility and identify products that they ignore or embrace. With this information, you can develop smart product placement and optimize the customer experience.

5. Increase Productivity

There are several ways that these systems boost productivity. Business video security systems connect various departments to foster collaboration. For instance, someone in your back office might note that the customer line up front is getting long, so they can send another cashier to the front. Additionally, a video security system helps employees feel protected so they’re free to be their most productive. And since employees know that their activities can be monitored, they’re motivated to work even harder.

6. Generate Substantial Savings

There are very real cost savings that come with installing a video security system. The city of Chicago reduced crime through the use of cameras and also saved over $4 for every $1 spent. By deterring and decreasing incidences of theft, you’re saving the costs of litigation, product replacement, corresponding medical costs and even the psychological and emotional costs that a break-in or internal theft generates. You’re also saving significant costs associated with hiring one or more guards to protect your people and property.

Are you considering adding a business video security system to your security plan? We can help. With over twenty years experience in this field, we have the expertise to design a system that works best for your needs. his field, we have the expertise to design a system that works best for your needs. We can evaluate your existing system and leverage it to meet the end solution seamlessly. Contact us to see how a video surveillance system can boost your security and your bottom line.

Last Chance to Join IST’s “Security of Security” Event

Last Chance to Join IST’s “Security of Security” Event

More than ever, there needs to be an organizational mindset that places importance on cybersecurity as much as physical security. Modern security systems are cyber-physical systems, inheriting both the power and pitfalls of the digital world.

 

With increased interconnectivity, there are more threat opportunities and surfaces of attack. It’s critical to comprehend all of what is necessary to defend against.

 

IST is always seeking out the best ways to keep your physical and cyber-world secured. That’s why we’re hosting our “Security of Security” event on May 1 (in Richmond, VA) and May 3 (in Herndon, VA).

 

Designed for end users, clients and customers, “Security of Security” will help you identify and mitigate risks and achieve cyber and physical security resilience. You will hear presentations from IST’s best-of-breed technology partners and industry experts, from Genetec and Bosch.

 

WHEN & WHERE:

May 1, 2018 – Richmond, VA, 9:30 a.m. – 2 p.m. (Lunch will be provided)

May 3, 2018 – Herndon, VA, 9:30 a.m. – 2 p.m. (Lunch will be provided)

 

WHO SHOULD ATTEND:

Customers, clients and end users who are:

  • Interested in next-generation security requirements and controls
  • Embarking on an upgrade or implementation of a security platform
  • Seeking solutions to support immediate requirements and evolve in the future

 

Get the knowledge you need to strengthen physical systems and add cyber safeguards. Reserve your spot for this complimentary event today!

 

IST’s “Security of Security” Event

Integrated Security Technologies’ Spring 2018 Education Series Presents our “Security of Security” Event

May 1 (Richmond, VA) and May 3 (Herndon, VA)

Security has been greatly influenced by the changes in our daily technology capabilities. In many ways, our interconnected world benefits the security industry—making our security systems smarter, more powerful, more cost-effective and easier to manage.

 

In other ways, our industry is becoming more vulnerable. We are faced with unprecedented threats to people, property and data.

 

As the security sector undergoes enormous evolutions, both innovations and exploitations will proliferate. Without the proper protection of critical assets, the size, scope and severity of security threats and attacks will likely increase over time.

 

Please join us for our Spring 2018 Education Series event this May with a focus on “Security of Security.” This event will show how to decrease system vulnerability and increase asset protection through technology advancements. You will hear presentations from Genetec and Bosch and have access to one-on-one discussions with industry leaders.

 

WHEN & WHERE:

May 1, 2018 – Richmond, VA, 9:30 a.m. – 2 p.m. (Lunch will be provided)

May 3, 2018 – Herndon, VA, 9:30 a.m. – 2 p.m. (Lunch will be provided)

 

WHO SHOULD ATTEND:

Clients, customers and end-users who are:

  • Interested in next-generation security requirements and controls
  • Embarking on an upgrade or implementation of a security platform
  • Seeking solutions to support immediate requirements and evolve in the future

 

There is limited space available for this complimentary event, so reserve your spot today.

Review Your School Security System

Now’s the Time to Review Your School Security System

We’ve reached a grisly tipping point in the fight against school shootings in this country. February’s massacre at Marjory Stoneman Douglas High School in Parkland, FL unleashed a national outcry. Led by the very students that survived this too-often seen tragedy, awakened activists throughout the U.S. are loudly petitioning, lobbying and marching for more gun control and safer schools. Change is in the air.

 

Leaving the gun debate aside for a moment, one of the best ways to protect our students is through smart and effective school security systems. In recent years, there’s been a huge uptick in installations, as schools move to secure themselves with cameras, perimeter security hardware and mechanical and electronic locks for the classrooms. They’re implementing what’s known as “airportization,” as they seal up possible breach points and provide gatekeepers with the technology and authority to keep would-be attackers out. Most schools now vet visitors with a camera and then buzz them in with an intercom.

 

By prioritizing security, schools are able to marshal the budgets needed to implement school security systems through several government programs. Michael Ruddo, Vice President of Business Development at Integrated Security Technologies, Inc., who was quoted in SDM Magazine in the article “What It Takes to be Successful in the K-12 Security Market,” explained, “there is more state and federal funding available for them through grant programs.”

 

Specifically, the U.S. Department of Treasury recently instituted the E-Rate program to provide discounts and incentives to help schools upgrade their networking infrastructure to counteract cyber threats that can also trip up their physical security.

 

School Security Systems are Easier to Get

Is your system up to snuff? Now’s the time to review your school security system because many schools are seeing real savings from theirs. As schools receive more grant money for security solutions, the technology is concurrently decreasing in cost. The end result is that schools may be able to afford more hardware and a greater number of services.

 

Additionally, security integrators can also provide more help than in the past.

 

“Fortunately security technologies have migrated to the IP/IT infrastructure,” said Ruddo. “Since this has already been built for collaborative and educational reasons, it is getting to the point where everything is IP-based, from the computers to the AV systems with smart boards.”

 

It’s easier than ever for security integrators to help schools achieve their security objectives.

 

Integrators like IST have become true partners to educational institutions ranging from K-12 to higher education, overseeing comprehensive school security systems that are seamlessly integrated and can be managed remotely or on-site from one spot.

 

“We take a very holistic approach,” Ruddo said. “We want to understand, ‘What are your risks? What are your problems? How do you operate on a day-to-day basis?’ Maybe locking that door will have a huge impact.”

 

With this approach, IST can provide exactly what your school needs—no more and no less.

 

If you’re looking to add or upgrade your school security system, we can help. We offer complete solutions ranging from video surveillance systems, to door entry systems, to barriers, to cybersecurity measures and more. In most cases, we can even integrate the latest technology with your existing systems. We closely monitor security trends in schools and elsewhere, and internally test the latest security driven products to make sure they’re effective every time.

 

We’ll help you design a security system that helps you—and your students and faculty—feel safe. Look here for a list of the best ways to secure your school.