Arecont and SIA Failing Cybersecurity Efforts

Author: John Honovich, Published on Jul 22, 2016

Do as we say, not as we do.

The effective motto of the Security Industry Association and their cyber board member Arecont Vision. Today, the two companies issued an interview where they talked cybersecurity.

Ironically, though both companies fail following their own guide.

** ** ** ***, *** ** ** **.

*** ********* ***** ** *** ******** ******** *********** *** ***** cyber ***** ****** ******* ******. *****, *** *** ********* ******** ********* ***** **** ****** *************.

**********, ****** **** ********* **** ********* ***** *** *****.

[***************]

The *****

*** ****** ************** *****. ** ** ****** ***************, ********* ********** *************** ****:

******* ** *****.

******* ******* *********.

SIA *******

***'* *** *******, ****://***.****************.***/ **** *** ******* ** *****. 

**** **********, ***'* ***** **** **** *** *** ***** ***** puts ***'* ***** ** **** ** ******* ***** ********* ******:

[******: *** *** *** ***** ***** ***** **** ** *** https]

*******,*** ****** **** * *** *** *** **** ****** ******:

Arecont *******

******* ***** ** ******** ******.

***, ******* ******* ** *** ******* ***** ** ***. ***** about ****? *** ** ***. *** **** ** ******. (*******: **** ****** ******* ******* *** ** ******)

***, *******'* ***** ****, **** ***, **** *** ******* *****:

[******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.]

*****,******* **** ****** **** * *** *** *** **** ******.

****** *** ******** **** *********, ******* ******** ** ** ******** at ***. ** ** ******* ********* *****:

******* ****** ******* ** *** **** **** ************** *******

"Thought **********"

******, *** *** ******* **** ************ ********** ** ***** '******* leaders'. *** ***** ***** '**********' *** ** ******** ** **** followed ***** ***** ********** **********? **** *** *** ******** ******* ****** than ****?

*** *** **** ***, ** **** **********, **** ******* ** its ************* ***** **** ******* ***** ** ******** *********** ****** in ***** *** *****. ** ***** ****?

Comments (7)

**: * **** *** ****! *** ***** ***** ******* **** companies.....

**: **** ****'* ******* ****

**: ****?

**: **** *** ********?

**: (***** *****)

*** **** **** *** **** ******? ;)

***** **** ** ** *********** *** ** *********** ************ ** create * ****** ****** ** *** ******** ** *** *** enabled *******, ***'*, ***'*, ****** *******, ***** *******, **** **********......**** breath, ********** ********, ******** ****** *****, ******** *** *******. **** sort ** *********** **** ****** **** ** *** **** ** Manufacturing * ****** *********** *********** **** *** *********. ** ****** with *** *** ****-*** ******** ****** *** *** *** **** the ****** ***** ** ** *** **** *** ***** #'*.

*** ************** ***** **** ***** ** **** ** *** ** Code ****** ** ******* ***** **********. *** ******* ******* **** IP66 ** **** ****** *** **** ******* *************, *** ** your ******** ******** ** ***'* ** ***** *** ** ***** then *** *** **** ** *** ****. ** ***** *** know *** *** *** **** *** ***** ***** ***** ********* to ***.

**** ***** ****** * *** **** ******* ** *** ****** especially ***** ****** **** *** ** ******* *** *** ** the *** ****** ****** **** *** ** ******** ** * smartphone (**** ********** * ****). **** *** ***** ****** "**** it ******* *** **** ***** *** **** ******** ********** ******* running **/* ******** *** **** ****** ****** ******* ********** *** exploiting **** *** ** ****** ******* ****'* **** **** *** programmed ** **?" **** **** **** *** *** ***** *** well **** ** ***** * ***** *** ****** ****** ***** be * ***** ** ********* ** ****.

******: *** *** ***** ***** ***** **** *****, ******* ***** has ***.

******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.

**** ****** ******** ************* ******** **** ******, *** ***** **** at * ****!

****, *** *** ** *** **** ** *** *** *** known ** *** ******** ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Guide

Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
IP Camera Manufacturer Compression Comparison on Nov 27, 2017
Despite the use of standards-based video compression (H.264/H.265), our tests show that default image quality settings for different manufacturers...
CBR vs VBR vs MBR - Surveillance Streaming on Nov 21, 2017
How you stream video has a major impact on quality and bandwidth. And it is not simply CODEC choice (e.g., H.264 vs H.265). Regardless of the...
PoE UPS Tested (Energy Reconnect) on Nov 15, 2017
In security, backup power is important, but most often requires UPS systems or extra cabling to devices for low voltage power. Now, some have...
Mobile Credentials (BLE / NFC / Apps) Guide on Nov 14, 2017
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...
Improving Project Registration Guide on Sep 29, 2017
Manufacturers want integrators to register large projects. Integrators want the discounts that come with registration, but not some of the other...
Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
Axis Camera Optimization App (UI Me) Tested on Aug 28, 2017
A new Axis camera app (ACAP) called UI Me has been released, offering a number of interesting features including optimization wizards and...
Camera Application Selection Guide 2017 on Aug 23, 2017
Entrances, hallways, rooms and parking lots are perhaps the 4 most common areas where surveillance is deployed. But what is the best type of camera...

Most Recent Industry Reports

Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Hikvision NA Biggest Sale of 2017 on Dec 07, 2017
Hikvision North America has been relatively disciplined the past 5 months, reducing the number of sales and the breadth of what is on sale. No...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...
Lighthouse Deep Learning Camera Tested on Dec 07, 2017
A Silicon Valley startup, Lighthouse, with a Stanford PhD CTO, has released a deep learning AI camera with 3D sensors for just $300. The company...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
'Catastrophic Problem' For Videofied App on Dec 06, 2017
Less than 2 months after closing their DIY division DragonFly, Videofied has been hit with a problem the company calls 'catastrophic'. Now the...
ASIS Dumps 'ASIS' For Show on Dec 06, 2017
After 60+ years, ASIS is dumping its eponymous show name and replacing it with 'GSX'. This is a classic marketing mistake. For a show struggling...
Risks Of Managing End User Passwords (Statistics) on Dec 05, 2017
Integrators know admin passwords for nearly all end-user systems, according to IPVM statistics. But how do they manage them? How do they ensure...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact