fbpx
Windows 10 Program, Greenville, South Carolina

Wi-Fi Sense, why this Windows 10 feature is freaking everyone out

Windows 10 includes a new feature called Wi-Fi Sense, which is making some folks uneasy.

Windows 10 – Wi-Fi Sense allows you to automatically log your friends onto your Wi-Fi network without ever giving them your password. It’s a convenient solution to the awkward “what’s your Wi-Fi password?” conversations.

In turn, you can use Wi-Fi Sense to automatically connect your Windows 10 PC to your friends’ Wi-Fi networks without knowing their passwords.

Sounds safer than telling them your password, which you probably use for your bank and email accounts, right?

Maybe. Maybe not.

Why Wi-Fi Sense is safe

Microsoft enables Wi-Fi Sense by default on Windows 10, but it doesn’t share your networks by default. You have to actively choose to share your Wi-Fi network by clicking a box that says “Share network with my contacts” when logging in.

When you share your network, all of your Facebook (FBTech30) friends as well as your Skype and Outlook.com contacts will be able to automatically log onto your Wi-Fi network when their Windows 10 PCs are in range. With Wi-Fi Sense, they don’t need to enter a password to log on (if they have a Mac, iPhone or Android device, you’ll still have to give up your password).

And when your friends connect via Wi-Fi Sense, they won’t then, in turn, be able to share your network with their friends.

Wi-Fi Sense stores your Wi-Fi network password on a Microsoft server. It’s encrypted, so if a hacker were to break in, your password would appear as garbled text. And Windows 10 does not allow you to share access to corporate Wi-Fi networks that use special security protocols.

Why Wi-Fi Sense is a potential security threat

But what about that Outlook.com contact turned stalker? Do you want that person to have access to your network? Wi-Fi Sense doesn’t allow you to share your network with an individual — it’s either all your contacts or none of them.

When people gain access to your network, all kinds of bad things can happen: They can potentially hack into other devices connected to that network, including your computer and smartphone. They can potentially steal data off your devices, including photos, emails and other personal information.

Microsoft claims that if you share your home Wi-Fi network via Wi-Fi Sense, your contacts won’t have access to other computers, devices or files stored on your network. That’s accomplished by turning off a feature called “network discovery,” preventing your friends’ computers from seeing the other computers and gadget connected signed into your Wi-Fi network. That makes it more difficult — not impossible — for your hacker friend to steal your stuff.

A Microsoft spokesman couldn’t immediately be reached for comment.

Should you stop using it?

You’re probably safe using Wi-Fi Sense.

All these nightmare scenarios are possible … but farfetched. Even the worst-case scenario — a stalker using Wi-Fi Sense to steal your naked photos — would require that person to sit outside your house with a Windows 10 PC while he hacks into your network.

But if you do want to protect those naked photos and you shared your network via Wi-Fi Sense you can stop that. Windows 10 lets you do that in settings (it takes a few days to register). You can also opt your network out of Wi-Fi Sense entirely by adding the phrase “_optout” to the end of your Wi-Fi network’s name.

Article Provided By: CNN Money

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Evolution of Fire Alarms, Greenville, South Carolina

Improved Communication, User-Friendly Features Are Part of Evolution of Fire Alarms Part 2

Evolution of Fire Alarms

Combine powerful information provided by field detection devices with the ability to capitalize on high-speed data transmission provided by fiber optic transmission media, wide-area and local-area networks, and you have fire alarm systems capable of sending very detailed information via Internet-based digital alarm communicator transmitters or direct networks to emergency responders or off-site monitoring locations with device specific detail.

Because the fire alarm industry knew little of professional sound and communication principles, early generation voice communications systems provided unintelligible notification messages that were solely used for fire alarm functions and fire department operations. The voice communications component of fire alarm systems has evolved such that, when designed properly, specifically routed messaging can deliver clear emergency and non-emergency messages, including music. This change required the fire alarm industry to realize that redundant voice communications systems (i.e., PA systems and music systems) could be replaced by fire alarm voice communications systems. Codes in place require the industry to supervise speaker circuits for integrity in the active state. In other words, while music is playing, the fire alarm system must be capable of identifying that a circuit has been damaged or broken. Today this capability is now commonplace for the major fire alarm system manufacturers.

Over the last 10 years, fire alarm systems have begun to evolve into multi-faceted mass communication platforms, largely as a result of terrorist events and government or military needs. These mass communication capabilities include fully intelligible voice messaging systems that can integrate textual signage. Multi-faceted mass communication plans can now draw on the fire alarm system to provide message outputs via text messaging, paging and email. Additionally, fire alarm systems can be seamlessly integrated with wide area mass notification systems that utilize high-power outdoor speaker arrays that can reach large geographical areas with highly intelligible messages.

More User-Friendly Features

All of this information must be difficult to navigate and use, right? Quite the opposite. New fire alarm control unit interfaces have capitalized on technology. Manufacturers are utilizing intuitive liquid-crystal displays and well-labeled switches that make navigating through all of this information as simple as using a smart phone. Manufacturers have integrated navigation wheels and touch screens to make navigation intuitive and closely parallel the electronic tools that we have all become accustomed to using daily.

Modern fire alarm systems have the ability to perform remote status querying, which ultimately improves user interface and allows facility managers to remotely, via the Internet, connect to their fire alarm system to interrogate its status. No alterations may be made remotely, but this interface has improved the ability of facility managers to interact with their fire alarm systems and dispatch the right maintenance assets quickly.

Article Provided By Facilitiesnet

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Fire Alarms, Greenville, South Carolina

New fire alarm systems offer fewer false alarms Part 3

New Fire Alarm Systems Offer Fewer False Alarms

New fire alarm systems offer fewer false alarms than older outdated systems. Fire alarm systems of decades past suffered from the problem of “crying wolf.” Nuisance or false alarms conditioned building occupants to ignore fire alarm systems when they sounded an alarm. This pattern of response over the years has resulted in loss of life. As one would expect, the detection technologies have evolved with the fire alarm control units in an effort to address these reliability concerns.

Detectors installed only a few decades ago relied on a single technology to perform detection. A large majority of spot-type smoke detectors were ionization detectors that relied on a radioactive source to ionize the particles in the air and monitored the resultant electric potential in the sensor-housing atmosphere. Other detectors, also widely used, were photoelectric smoke detectors using LED light sources. However, because these spot-type detectors were relying on one method of detection, they were susceptible to nuisance alarm events.

Current addressable spot-type fire detectors have evolved to utilize microprocessor-based detection technologies that allow the detectors or the fire alarm control unit to make intelligent decisions about what they are sensing. Most large fire alarm manufacturers now produce detectors that monitor for multiple factors — the presence of combustion gases, an increase in temperature and the presence of smoke particles — to make a “big-picture” decision. State-of-the-art and innovative detection systems often have the ability to discriminate combustion products from nuisance sources such as steam and dusty environments.

These new detectors have dramatically improved the reliability and credibility of fire alarm systems. As false or nuisance alarm frequency is reduced, the public perception will hopefully improve. Some manufacturers now offer guarantees that smoke detectors will not activate unless there truly is a fire event.

Spot-type smoke detectors installed 20 years ago also required sensitivity testing. When dirt infiltrated the detector’s sensor housing, a nuisance alarm was often the result. Intelligent fire alarm systems have eliminated the need to perform sensitivity testing since the panel can track detector sensitivity. Additionally, intelligent detectors can track their factory sensitivity deviation and compare that sensitivity to degradation in performance as a result of dirt rather than a nuisance alarm; this condition is reported as a dirty detector. Building maintenance personnel can then address the dirty detector long before it results in an evacuation.

Linking Fire, Other Building Systems

Today, many manufacturers have developed fire alarm system integration methods with building automation systems that enable seamless communication among all building systems. These interfaces can use industry-standard building automation networking protocols that allow status sharing between systems. These capabilities as well as fire alarm system advancements enable smoke control, smoke exhaust, post-fire smoke exhaust systems, and automated fire compartmentalization to be controlled by one centralized system.

Article Provided By Facilitiesnet

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Integrated Security Design Solutions, Greenville, South Carolina

Integrated Security Systems

Integrated Security Systems for Greater Business Value

Security countermeasures, such as surveillance, address threats and if done effectively eliminate them; this is more likely the case when an integrated solution is deployed.  In looking at integrated security solutions, there exists an opportunity to move beyond a view of providing countermeasures to threats toward a new perspective of security as a means of delivering critical business value.
Security systems use multiple techniques in order to achieve this. The combination of access control, intrusion detection, perimeter and video into an integrated security solution provides the best opportunity to counter threats and add value.

Traditionally security systems have been seen as providing five “D”s. That is security systems deter, detect, deny, delay and defend against threats. And while these are important functions, the value of security needs to move beyond these traditional security concepts to one of delivering value to the enterprise. In some cases this is simply learning to describe security in new terms; in other cases it is learning to leverage systems to deliver new outcomes.

While standalone surveillance systems exist, more often than not they are part of integrated security solutions. In the case of integrated security solutions, the surveillance system is used in combination with access, perimeter and intrusion detection. The value of a security solution increases in relationship to the extent of its integration with other security and information technology components.

Access control, perimeter and intrusion detection allow surveillance solutions to be focused on specific security transactions. This improves operator performance while reducing screen fatigue. It also allows transaction information to be combined with visual data, and integrated perimeter solutions to be combined with pan-tilt-zoom features of surveillance cameras.

Integrated security solutions address governance, risk management and compliance (GRC) in addition to security. This cannot be addressed by surveillance alone, but it can provide additional return on investment to the CEO, CFO and CIO while addressing sector-specific compliance regimes. These systems can bake in security across transactions and provide value to stakeholders and shareholders.

These solutions allow coupling with information technology systems to increase the details available around security events. This can be combined with information from information technology systems such as security information and event management. Access control information, along with video, can place individuals at particular locations to help determine whether or not accounts have been compromised or if in fact an insider threat exists.

Integration also talks to important current trends in the enterprise: Physical security systems have extensive logging capabilities. These logs represent not only specific transactions but also metadata that can be used not only by physical and information security groups but also by marketing and other parts of the organization. As an example, surveillance video can not only be used to guard against physical breaches or theft but also to measure customer traffic and related buying behaviors. Surveillance cameras, in addition to the balance of an integrated security system’s components, represent the same kind of connected workplace that is driving the interest in the Internet of Things (IoT) and big data.

In looking for an integrated surveillance solution, remember that surveillance delivers its maximum value when it acts in combination with alarms, access, video, perimeter and command and control. Users should be careful not to break apart these capabilities particularly at the command and control level.

This is where the meaning of integrated security really comes into play. Video management systems provide important features in delivering surveillance solutions. Integration of these video features along with other security functions in the security operations center under the command and control function will deliver the most value and needs to be a strong factor in deploying an integrated solution.  Look for an integrated security system that maximizes surveillance value and in the process you will find you have also maximized the value of security.

Article provided by Security Magazine
Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Smart Home, Video Surveillance, Greenville, South Carolina

The Future of Home Security

The future of home security: Get ready for sensors and pro-active systems

Today, home security is fairly straightforward. If you live in a home that has an “alarm” you’ve got a bevy of motion sensors dotted around your house, a central keypad by your front door with a standard keypad to disarm it and a box on the front of your house that says “look at me, I’m protecting something valuable inside”.

With the steady march of connected devices invading the home, and a number of companies looking to improve how we secure it, the future of home security is going to change drastically in the next couple of years, whether that is remotely controlling our lighting, seeing inside our house, or merely having sensors on our doors and windows detecting movement.

“Nothing concerns us more than the fear of someone breaking into our own home, yet very few homeowners heed the warnings until it’s too late,” explains Kris Hogg, chairman of CEDIA, the Custom Electronic Design and Installation Association. “A lot of the time monitored alarm systems can be integrated with the very latest hi-tech lighting and automation facilities in order to provide even greater levels of security.”

Those systems include integrating the alarm system with an intelligent lighting system, such as the Lutron Homeworks system, so all the lights in your property will automatically switch on or flash incessantly when an intruder is detected, or setting your lights to randomly come on and off while you are on holiday to fool would-be burglars.

It is not just about integrating security systems with lighting however, although that is a start.

The Future of Home Security

Piper is a camera that monitors your home.

Home security is just one of the areas that connected devices in the home are likely to play a large part, but we are just at the start of the journey according to Jeremy Peterson, GM of Honeywell’s EMEA Home Comfort & Energy Systems division:

“It will become a much more consumer experience. Things like recognising you to disarm the security system will be possible too, and if you look at what’s available now like video monitoring, it will certainly have a place, and we will continue to see those things, but stepping away from the traditional way of looking at security.”

Video monitoring is certainly the rage at the moment with devices like BT’s HomeCam, and Belkin’s WeMo NetCam HD Wi-Fi Camera all offering homeowners the chance to see what’s happening in their house at any given time, as long as you have an internet connection.

If it’s not basic camera offerings, devices like Piper, the successful Indigogo campaign or Canary are products that once plugged in, you can monitor a number of different points of data like movement, temperature or sound, as well as connect to other devices to help you control your lighting through a singleservice.

Where Peterson sees things moving forwards however is sensors, be it cameras, motion detectors, or markers tracking your movement in your home via Bluetooth, Wi-Fi, or GPS. It will mean your home security system will be able to pro-actively work to help you out rather than you having to remember a series of codes.

“The system architectures are going to become a lot more pro-active in making more things possible. The key fob on the wall has a broad audience, but you will continue to see much more flexible and device level security solutions. Those certainly have a lot of room to grow.”

Honeywell, Tado, and Google’s Nest, are all actively using geofencing to help better control intelligent heating systems and Honeywell sees this as just one of the keys to success in improving security in the home too.

In an interview with Pocket-lint, Peterson outlines a future scenario in the home whereby your house will automatically know you are at the front door and unlock the door, or disable the alarm for you:

“What we are working towards is a pro-active approach, but allowing them to craft the system they desire,” said Paterson, before warning that although the company already offers similar solutions to some of its 1.5 million business customers around the world, there is a big difference between providing comfort over security.

The Future of Home Security - i-Bell

i-Bell is an intelligent Wi-Fi enabled doorbell that will call your phone when someone rings the bell

“When you start moving from comfort to security, there is less willingness by Honeywell and the consumers to compromise. With door locks, for example, it has to work every time instantly, there is no room for error.”

While many have wondered, including us here at Pocket-lint, why we still don’t have central locking for our house but we do our car, it is understandably, the notion that we could be locked out of our homes simply because the computer as encountered an error would be unforgivable.

“We will do it when are ready rather than trying to be first to market,” added Paterson.

In the meantime we should probably just get used to having intelligent doorbells instead.

i-Bell is one such product hoping to let you see who is at your front door by connecting to your smartphone. The successfully backed Kickstarter Wi-Fi doorbell will notify you when someone is at the door and then let you talk to them via your smartphone even if you aren’t at home. Anyone that does knock automatically gets their photo taken so you’ve got a record of who has visited your house and you can tell them you are in, out, or simply trapped under a large cupboard.

Inside the house and sensors and iBeacon-like technology will be able to help determine where we are and what we are doing.

The Future of Home Security - Lightpad

Lightpad is hoping to make the switches in your home do more than just turn on a light

Lightpad, is an intelligent light switch due to launch in 2015 and will featureBluetooth that can, if you want, track you around the house.

Created by a new company called Plum, the LightPad is packed full of tech and has a capacitive multi-touch interface controlled by a number of gestures, along with a coloured LED on it allowing it to notify you if you have a message, or if something is wrong.

Utz Baldwin, CEO at Plum explains that having Bluetooth in the Lightpad it would mean that when you walked up to your front door, for example, the Lightpad would know you are approaching and then automatically turn on the lights as you walked through the door.

Others are looking to increase the number of sensors in our homes too. Nest’s intelligent smoke detector, Nest Protect, might have received some flack for being recalled, but it too uses a plethora of sensors to better inform the wider system. If carbon monoxide is detected in the house, for example, it turns the boiler off, as long as you’ve also got the company’s thermostat.

Fibaro, takes things even further offering a central hub that numerous sensors can wirelessly connect to. It can track everything from water, smoke, temperature, light, and movement as long as you’ve installed the right sensor.

So should we be prepared to live in a home full of sensors monitoring our every move? We put that question to Paterson at Honeywell:

“Consumers have to make those choices. The knowledge that they are giving up something to benefit themselves will be something they have to weigh up. For systems to make pro-active decisions you will need sensors, there is no real other way around it.”

The Future of Home Security - Fibaro

Fibaro wants to offer dozens of sensors to know what your house is doing

It’s a belief that Russell Ure, founder of Piper also has:

“I think sensors in the home is only a matter of time,” said the Canadian founder. “To achieve the level of automation that we want, you will need to have technology there to make it all happen. It will be required. As all of this technology becomes more and more capable, we will need more sensors.”

Paterson and Honeywell, don’t see that as a major stumbling block believing that when consumers trust the brand, like he says they already do with the quick adoption of Honeywell’s intelligent heating systems, that they will be happy to accept that to get the new benefits these systems bring, there will have to be some give and take.

Article provided by Pocket-Lint
Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Security Image, Alarm/Integration, Greenville, South Carolina

VIDEO PRICE-POINT PRESSURE

Video Price-Point Pressure Intensifies

Video surveillance may be one of the most valuable segments in the security industry, but it is not without significant disruption as well as forces that are eroding equipment margins. In the first half of 2014, the sector grew faster than most others in security yet not at the rate analysts forecasted at the beginning of the year.

Imperial Capital estimates the video surveillance equipment market (excluding services, which roughly doubles the market size) grew about 14% to $12.5 billion. Networked video, in particular, continues to grow on a unit basis in the mid-teens to around 20%. Yet for all the gains in unit growth, the industry is increasingly experiencing a falloff in average equipment pricing. It’s difficult to gauge just how much, but the decrease is thought to be in the 5% to 10% range, and perhaps more.

So, are the valuations of higher quality, higher priced vendors taking a hit due (Video Price-Point Pressure) to the low-cost competition in the eyes of public investors? Anecdotal evidence would suggest the answer to be yes for the time being.

During ASIS 2014, Imperial Capital hosted tours of leading public and private companies for public investors. Time and again throughout the show investors inquired about the potential pressure on gross margins from Asian camera vendors. They wanted to know the ramifications for leading video companies such as Axis Communications (OM: AXIS), Avigilon (TSE: AVO), FLIR Systems (NASDAQ: FLIR), Mobotix (DB: MBQ) and Vicon Industries (NYSE MKT: VII), and private companies such as Bosch, Pelco, DvTel, and Arecont.

Hence, Imperial Capital reasons if a manufacturer depends on cameras alone to drive value to the channel and to the customer, then it makes sense to expect gross margins will indeed come under pressure. “Good enough” is a tough competitive hurdle for higher priced manufacturers to contend with, but a firewall of sorts has materialized in the industry to protect market share and strengthen positioning.

Enter value proposition.

Price becomes much less of an issue for manufacturers and integrators alike if they can provide critical value to the end user through broader video solutions. Solutions, for example, that combine superior clarity, analytics that enhance security measures and business intelligence as well as installation efficiencies for the integrator. Also key, fostering trusted, long-term relationships with channel partners and end users.

Taking this concept even further, those companies that can successfully provide the marketplace with a holistic solution that combines software (VMS, analytics, etc.) and hardware (cameras, storage, etc.) in one integrated system are primed to become leaders in the space. Recent M&A activity (see sidebar) by former standalone companies demonstrates the rise of integrated video solutions.

In the year ahead and beyond, the industry can expect even more consolidation as companies jockey for market share by bringing broader solutions and functionality to bear.

The pricing turmoil is due to competition from China-based firms, namely Hikvision and Dahua but also Infinova, Vivotec and others. These firms are hit-ting a sweet spot by supplying the marketplace with lower-priced cameras that may not include all the feature sets as more expensive brands but are considered good enough by some end users, primarily in the residential and small- to medium-size business markets.

Article provided by Security Sales & Integration

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

PCI Compliance Security 2015 Greenville, South Carolina

PCI Compliance

Here is a blog every online business should take a moment to read.(PCI Compliance)

2015 will be a defining year for data security

President Obama’s State of the Union address this week launched a new emphasis on an ever-present threat in our daily lives – cyberattacks, kicking off what will be a defining year for cybersecurity protection, and for us at the PCI Security Standards Council, pivotal in improving the protection of consumers’ payment information globally.

Public-private collaboration and information sharing, education and awareness and leveraging the most secure technology as emphasized by the president are critical to protecting customers against the type of massive breaches we saw in 2014.  As the standard-setting organization for payment security, we are leading the charge to provide the standards and resources to help businesses secure this information.

Too many CEO’s are learning this lesson the hard way.  For American corporate executives moving forward, data security is job security.  Companies that fail to make data protection an everyday priority run the risk of losing money, losing business and destroying their reputations.

The good news is we know what works and what doesn’t.  In recent years, we at PCI have not seen any data breaches that weren’t predictable.  On the contrary, problems arise from a failure to maintain key security controls and a lack of vigilance.  Simply put, most data security breaches involving credit card data are not sophisticated attacks at all, nor are they new tactics.  Far too many of the recent major breaches we have seen in the United States were entirely preventable.

Something as simple as a password can cause problems. A recent study by Trustwave reported that the most popular numeric password used by the American business community is 123456.  The word ‘password’ remains one of the most commonly used passwords.  It wouldn’t take a very sophisticated hacker to crack that code

Fortunately, data security is now becoming a top-level issue, from the White House to Congress to corporate suites across America. President Obama’s speech this week will further drive the national conversation

Many companies need to change the way they view security issues. Passing a PCI Standards assessment is a first step, but properly following security standards 24/7 is required to prevent data breaches. Not all companies do that, thinking instead that once they check the box of passing a data security assessment their work is over. This kind of thinking is a major problem.  Data security cannot just be a “box you check” once or twice a year.  It has to be an all-day, everyday priority.  Protecting data is no longer a simple task that companies can just leave to the IT Department.

EMV Chip Technology

In 2015 America will take a major step by implementing EMV chip technology for consumers.  This is a critical step forward and will provide better data protection by adding a new additional layer of security.  EMV chip technology, which is already in use throughout much of the advanced world, provides consumers with strong security features. It helps businesses lock down their point of sale and provides protection against fraudulent transactions in face-to-face shopping environments.  However, while EMV chip technology is an additional layer in data security protection, it doesn’t solve every problem.  We should not be fooled into believing it is the magical technology that eliminates data security threats.  It isn’t.

EMV chip technology will not prevent fraud when a card is used online or in mail and telephone order purchases.  EMV technology also would not prevent breaches that involve targeted malware.

No one single technology is the answer. As we look towards the White House Cyber Security Summit at Stanford University next month, it is important for American businesses to prioritize strong security principles by maintaining a multi-layer security approach that involves people, process and technology working together to protect consumers.

It’s time for a change in the mindset about data security. Vigilance must be an everyday priority.

Article Provided by The Hill

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

Computer Hackers, Security, Greenville, South Carolina

Are You At Risk? Computer Hacking Liability and You

I had the great honor yesterday to speak at the InnoVision Forum on Computer Hacking Liability – Are You At Risk?.

We put together a presentation on our patent pending Firewall called “The Wall”. I have included that presentation in this post. Here is a look at the presentation:

What is PCI Compliance? PCI Compliance is now required for all business no matter how large or small.

Myths About PCI

•I can wait until my bank asks me to be PCI compliant.
•I don’t use a POS system I don’t need to be compliant.
•The software I use is PCI Compliant
•PCI is a law created by the credit card companies.
•The fines or fees are not that expensive.
•There is no state or federal regulation.
Hacking – Cyber attacks are on the rise.
PCI Presentation for InnoVision Forum on Computer Hacking Liability – Are you At Risk?
Resources:

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

PCI Compliance Requirements, PCI Compliant Requirements, Network, Greenville, South Carolina

PCI Compliant Requirements

LVT’s PCI Compliant requirements are derived from a 69 page document that was created in October of 2010 by the PCI Security Council. Liquid Video Technologies secures your network so that your business is PCI compliant.

Here are just a few of the rules that you need to comply with in order for you network to be PCI compliant.

First and foremost you must have double authentication to gain access to your router or any device that is behind your Firewall. This includes but not limited to Remote Desktop Application, Accessing Web Based Devices for Music, Accessing Security Cameras and  all ports must be closed, we have patent pending process for Double Authentication.

·         Must meet some or all requirements from 1.1 to 12.9.6, this is 69 pages that are required in some form or fashion. There are over 157 individual requirements

·         Must have logging sever the records all transaction for up to a year and be able to present then if an audit occurs – Section 10.4.3 to 11.1

·         All ports must be closed at all times, or you will fail your scan from Tustwave or one of the other dozen scan companies that are out there, but you still need access to your cameras, computers, web devices, firewall, and routers. LVT – has created a proprietary and patent pending method to accomplish this along with double authentication.

·         Must maintain and update firewall configuration and have a process in place to maintain the firewall on a monthly basis / weekly basis.

·         Must update rules and regulations to firewall and any new threats on a daily basis.

If you would like to know more about what Liquid Video Technologies protects your business from, please feel free to contact us at 864-859-9848 and we will provide you with our PCI DSS Checklist of items that we secure.

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

PCI Compliance Checklist, PCI DSS, Networking, Greenville, South Carolina

PCI DSS Compliance Checklist

PCI DSS Compliance Checklist
Here are the 12 primary requirements of the PCI DSS :

Requirement 1: Install and maintain a firewall configuration to protect cardholder data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Requirement 3: Protect stored cardholder data
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Requirement 5: Use and regularly update anti-virus software
Requirement 6: Develop and maintain secure systems and applications
Requirement 7: Restrict access to cardholder data by business need-to-know
Requirement 8: Assign a unique ID to each person with computer access
Requirement 9: Restrict physical access to cardholder data
Requirement 10: Track and monitor all access to network resources and cardholder data
Requirement 11: Regularly test security systems and processes
Requirement 12: Maintain a policy that addresses information security

Payment Card Industry Data Security Standard (PCI DSS)
With e-commerce on the rise, there have been numerous financial transactions made online, many of which involve making credit card payments for purchases. This increase in online payments has subsequently resulted in the growth of cases involving credit card fraud. Card numbers and card holder data are sensitive information which need utmost protection so that misuse is prevented and information is secured.

Therefore as a strategic security measure, companies & vendors handling credit and debit card information now need to comply with stringent security standards drawn by major credit card companies like VISA, MasterCard, American Express etc. so that security breaches are prevented and card holder data is safeguarded. The standard to be followed is a set of security requirements known as the Payment Card Industry Data Security Standard (PCI DSS) and applies to all members, merchants and service providers that store, process or transmit cardholder data regardless of transaction type (point of sale, phone, e-commerce, etc.).

What is the PCI DSS ?

The PCI DSS stands for Payment Card Industry Data Security Standard. It is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. It represents a set of rules that need to be adhered to by businesses that process credit cardholder information, to ensure data is protected. The PCI Data Security Standard comprise 12 general requirements designed to:

Build and maintain a secure network
Protect cardholder data
Ensure the maintenance of vulnerability management programs
Implement strong access control measures
Regularly monitor and test networks
Ensure the maintenance of information security policies
This standard is governed by PCI Security Standards Council https://www.pcisecuritystandards.org

Why should you comply to PCI DSS ?

Organizations that store and handle credit card information of their customers, irrespective of their size and nature of business, are always at a high risk of cardholder data misappropriation by criminals and other sources with malicious intent. Such security breaches will result in fines levied by credit card companies, litigations and loss in trust, and eventually business. Moreover, there is a deadline posed by credit card companies to achieve PCI DSS compliance and that is December 2007. Credit card companies levy huge fines up to $500,000 if businesses fail to comply to the PCI DSS within the stipulated time frame. Companies also run the risk of not being allowed to handle cardholder data if found non-compliant and having lost data. As a result, achieving PCI DSS Compliance is top priority for such companies.

Liquid Video Technologies Logo, Security, Video Surveillance, Greenville South Carolina

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

1 6 7 8