AV System Cyber Security

Lessons to Learn for AV System Cyber Security

 

Major corporations and retailers continue to experience data breaches despite the lessons learned in marquee attacks.

 

It has been nearly five years since one of the world’s largest retailers experienced a system data breach that exposed personal information and credit card details to nearly 110 million customers. While much was learned from details surrounding this incident, some key findings highlight measures worth considering in any organization’s cyber security plan:

Harden Fringe Access Points

To gain initial access, an email phishing campaign targeted a 3rd-party HVAC contractor who had access to corporate networks through the retailer’s vendor portal. Once the attacker had access into this fringe network access point they were able to navigate and stage the next steps of their attack.

Takeaway: Any organization that allows third-party vendors or partners to access corporate networks – be it via cloud connections or while working on-site – needs to demand partners follow cyber security protocols and include fringe access points and in their overall Cyber Security Plan. Fringe access points include audio-visual systems and networks used for video conferencing and meeting room collaboration which may be installed directly onto the internet and not implemented behind a firewall.

Ensure Real-time Intrusion Detection

The compromised contractor in the incident may have utilized a free version of malware detection software which did not provide real-time intrusion detection.

Takeaway: Free and other scan-on-demand malware detection solutions that don’t automatically update or access worldwide threat profiles are a security risk. A legitimate Intrusion Detection System (IDS) needs to access up-to-date, global threat profiles in realtime.

Ensure both Internal and External Threat Detection & Prevention

Once the corporate network was compromised the attacker was able to execute code malicious code within the network that spread until it reached the retailer’s POS systems and sensitive customer data. While the retailer did employ a tool that noticed the suspicious activity within their network, the system didn’t immediately thwart the activity and the retailer’s teams seemed to ignore the warnings.

Takeaway: a successful cyber security Intrusion Prevention System (IPS) needs to identify and prevent malicious behavior both outside and within the network.

 


AV Cyber Security that Detects and Thwarts both Internal and External Attacks in Real-Time.

If you’re not sure if your AV systems are protected from both internal and external threats, or if you’re wondering if your malware protection accesses up-to-date security threat profiles, you need FRG’s DuoGuard cyber security solution. Our hardware smart barrier detects and prevents both external attacks and suspicious internal activity – and accesses ever-changing worldwide threat profiles in real-time.

For more information or a demonstration on how FRG’s DuoGuard can help your organization, please send us an inquiry at info@frg.solutions.

 

 

Speed Matters in AV System Cyber Security

 

In securing the systems in your meeting/conference spaces, and across your organization, speed is of vital importance.

 

Latency – Microseconds Matter

We continue to read stunning accounts of often hi-tech organizations who experience data breaches and often don’t realize it has happened for hours or even days after the incident. Whether you’re aiming to prevent orchestrated hacker attempts or DDoS attacks–or simply trying to identify and prevent viruses or malware on employee USB thumb drives or other BYOD devices from infecting your meeting room systems (and beyond) the performance speed of your security solution matters. Response time to identify and shut down threats needs to be measured in microseconds. Given the sophistication of modern black hats, if your system security solutions aren’t able to identify and shut down threats in fractions of a second it might already be too late.

User Experience

At a very basic, user experience level, if your team actually notices that your cyber security or anti-virus systems are running scans in the background on your devices, not only does it negatively affect their productivity, it might lead them to choose to bypass your solutions. Beyond that, if you notice your cyber security solution working in the background, it might simply mean that the system just doesn’t perform at speeds needed to keep your data safe.

Reactive vs. Proactive

When it comes to cyber security systems, many rely on databases of “known threats” which trigger a security response. Modern hackers and their sophisticated bots are continually morphing attacks into new varieties that don’t fit the profile of existing, known threats. A cyber security solution that relies only on known threats, or doesn’t update its threat profiles frequently enough is prone to fail.

Real-Time Reporting

The speed at which cyber security solutions identify and shut-down threats is just one part of the story. Particularly in meeting and collaboration systems which might not be regularly monitored by core IT service teams, waiting hours or even days to be notified of significant threat activity is unacceptable. Real-time reporting via dashboard and ticketing systems is imperative.

 


A Better, Quicker Solution

FRG’s DuoGuard cyber security solution addresses all of these speed concerns for your AV systems. The hardware smart barrier we utilize performs at lightening speed–working virtually unnoticed on your network–with overall average of 11.6 microsecond latency measured in performance tests. DuoGuard is constantly updating its threat database by monitoring key data streams and sensing trends that allow it to predict and shut down threats that aren’t even known by most cyber security systems. And, when it comes to real-time performance, not only does DuoGuard analyze and respond in real-time, reporting to the DuoGuard dashboard is just as rapid and comprehensive–providing your IT teams and connected service providers threat information and log data that ensures clear communication.

For more information or a demonstration on how FRG’s DuoGuard can help your organization, please send us an inquiry at info@frg.solutions.

 

 

The Collaborative Enterprise

“Workplace transformation” is a popular phrase these days used by many to describe the changes that are occurring in our organizations. How we work, when and where is and has been changing. The days of employees all reporting to a brick and mortar office are gone. We are in our cars driving to appointments, getting on planes, working from our homes (and on vacation) as well as working in locations far from our managers and teammates. Millennials have entered into the workplace bringing with them the expectations that they can be connected on a moment’s notice to other workers, customers and media.  As these changes occur, how you adapt and support the new workplace is critical.

To further understand these trends and recommendations, check out http://cp.wainhouse.com/content/the-collaborative-enterprise-paper