Arecont and SIA Failing Cybersecurity Efforts

Author: John Honovich, Published on Jul 22, 2016

Do as we say, not as we do.

The effective motto of the Security Industry Association and their cyber board member Arecont Vision. Today, the two companies issued an interview where they talked cybersecurity.

Ironically, though both companies fail following their own guide.

** ** ** ***, *** ** ** **.

*** ********* ***** ** *** ******** ******** *********** *** ***** cyber ***** ****** ******* ******. *****, *** *** ********* ******** ********* ***** **** ****** *************.

**********, ****** **** ********* **** ********* ***** *** *****.

[***************]

The *****

*** ****** ************** *****. ** ** ****** ***************, ********* ********** *************** ****:

******* ** *****.

******* ******* *********.

SIA *******

***'* *** *******, ****://***.****************.***/ **** *** ******* ** *****. 

**** **********, ***'* ***** **** **** *** *** ***** ***** puts ***'* ***** ** **** ** ******* ***** ********* ******:

[******: *** *** *** ***** ***** ***** **** ** *** https]

*******,*** ****** **** * *** *** *** **** ****** ******:

Arecont *******

******* ***** ** ******** ******.

***, ******* ******* ** *** ******* ***** ** ***. ***** about ****? *** ** ***. *** **** ** ******. (*******: **** ****** ******* ******* *** ** ******)

***, *******'* ***** ****, **** ***, **** *** ******* *****:

[******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.]

*****,******* **** ****** **** * *** *** *** **** ******.

****** *** ******** **** *********, ******* ******** ** ** ******** at ***. ** ** ******* ********* *****:

******* ****** ******* ** *** **** **** ************** *******

"Thought **********"

******, *** *** ******* **** ************ ********** ** ***** '******* leaders'. *** ***** ***** '**********' *** ** ******** ** **** followed ***** ***** ********** **********? **** *** *** ******** ******* ****** than ****?

*** *** **** ***, ** **** **********, **** ******* ** its ************* ***** **** ******* ***** ** ******** *********** ****** in ***** *** *****. ** ***** ****?

Comments (7)

**: * **** *** ****! *** ***** ***** ******* **** companies.....

**: **** ****'* ******* ****

**: ****?

**: **** *** ********?

**: (***** *****)

*** **** **** *** **** ******? ;)

***** **** ** ** *********** *** ** *********** ************ ** create * ****** ****** ** *** ******** ** *** *** enabled *******, ***'*, ***'*, ****** *******, ***** *******, **** **********......**** breath, ********** ********, ******** ****** *****, ******** *** *******. **** sort ** *********** **** ****** **** ** *** **** ** Manufacturing * ****** *********** *********** **** *** *********. ** ****** with *** *** ****-*** ******** ****** *** *** *** **** the ****** ***** ** ** *** **** *** ***** #'*.

*** ************** ***** **** ***** ** **** ** *** ** Code ****** ** ******* ***** **********. *** ******* ******* **** IP66 ** **** ****** *** **** ******* *************, *** ** your ******** ******** ** ***'* ** ***** *** ** ***** then *** *** **** ** *** ****. ** ***** *** know *** *** *** **** *** ***** ***** ***** ********* to ***.

**** ***** ****** * *** **** ******* ** *** ****** especially ***** ****** **** *** ** ******* *** *** ** the *** ****** ****** **** *** ** ******** ** * smartphone (**** ********** * ****). **** *** ***** ****** "**** it ******* *** **** ***** *** **** ******** ********** ******* running **/* ******** *** **** ****** ****** ******* ********** *** exploiting **** *** ** ****** ******* ****'* **** **** *** programmed ** **?" **** **** **** *** *** ***** *** well **** ** ***** * ***** *** ****** ****** ***** be * ***** ** ********* ** ****.

******: *** *** ***** ***** ***** **** *****, ******* ***** has ***.

******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.

**** ****** ******** ************* ******** **** ******, *** ***** **** at * ****!

****, *** *** ** *** **** ** *** *** *** known ** *** ******** ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Guide

Sports Stadium Security Design Recommendations on Jul 24, 2017
Sports stadiums pose many challenges for designing security systems. The facilities vary from being mostly vacant, to packed with tens of thousands...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It includes our 20 manufacturer favorability rankings and 20 manufacturer...
Safes And Vaults Alarm Sensors on Jul 07, 2017
Vaults and safes are designed to protect valuables by enclosing them in steel or concrete boxes with thick doors and strong locks. However, any...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
Hikvision Hardening Guide Recommends Port Forwarding on Jun 09, 2017
Hikvision's Network Security Hardening Guide recommends port forwarding as a 'standard configuration', highlighted below: In this note, we...
Security Yard Signs and Stickers Guide on Jun 05, 2017
Many security integrators use signs or stickers with their company name and logo. Posting these in front the homes of residential customers...
Painting Cameras Guide 2017 on May 31, 2017
Finding cameras that are not plain white, black or silver can be a tough task.  Unfortunately, color selection is a problem for many who want their...
US States Security Licensing Guide on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...

Most Recent Industry Reports

$28M Drone Detection Startup Examined (Dedrone) on Jul 25, 2017
Dedrone has received ~$28M in funding to build what they call an "automatic anti-drone solution", a system to detect drones, and then automatically...
Dahua Suffers Second Major Vulnerability, Silent on Jul 25, 2017
Less than 3 months ago, Dahua received DHS ICS-CERT's worst score of 10.0 for their backdoor. Now, Dahua has received another 10.0 score for a new...
Hikvision H.265+ Bullet Tested (2035) on Jul 24, 2017
Continuing our tests of Hikvision's new low cost Value Plus line, we bought and tested the 3MP DS-2CD2035FWD-I, now including H.265+. We shot the...
Sports Stadium Security Design Recommendations on Jul 24, 2017
Sports stadiums pose many challenges for designing security systems. The facilities vary from being mostly vacant, to packed with tens of thousands...
Competing Against Convergint on Jul 24, 2017
No integrator is more aggressively expanding than Convergint Technologies. Owned and funded by private equity firm KRG, Convergint has acquired...
Security Robots Are Just Entertainment on Jul 21, 2017
Great entertainment, no real security value.  That is the happy (or sad) state of security robots in 2017. Knightscope robot's drowning, the...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact