Arecont and SIA Failing Cybersecurity Efforts

Author: John Honovich, Published on Jul 22, 2016

Do as we say, not as we do.

The effective motto of the Security Industry Association and their cyber board member Arecont Vision. Today, the two companies issued an interview where they talked cybersecurity.

Ironically, though both companies fail following their own guide.

** ** ** ***, *** ** ** **.

*** ********* ***** ** *** ******** ******** *********** *** ***** cyber ***** ****** ******* ******. *****, *** *** ********* ******** ********* ***** **** ****** *************.

**********, ****** **** ********* **** ********* ***** *** *****.

[***************]

The *****

*** ****** ************** *****. ** ** ****** ***************, ********* ********** *************** ****:

******* ** *****.

******* ******* *********.

SIA *******

***'* *** *******, ****://***.****************.***/ **** *** ******* ** *****. 

**** **********, ***'* ***** **** **** *** *** ***** ***** puts ***'* ***** ** **** ** ******* ***** ********* ******:

[******: *** *** *** ***** ***** ***** **** ** *** https]

*******,*** ****** **** * *** *** *** **** ****** ******:

Arecont *******

******* ***** ** ******** ******.

***, ******* ******* ** *** ******* ***** ** ***. ***** about ****? *** ** ***. *** **** ** ******. (*******: **** ****** ******* ******* *** ** ******)

***, *******'* ***** ****, **** ***, **** *** ******* *****:

[******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.]

*****,******* **** ****** **** * *** *** *** **** ******.

****** *** ******** **** *********, ******* ******** ** ** ******** at ***. ** ** ******* ********* *****:

******* ****** ******* ** *** **** **** ************** *******

"Thought **********"

******, *** *** ******* **** ************ ********** ** ***** '******* leaders'. *** ***** ***** '**********' *** ** ******** ** **** followed ***** ***** ********** **********? **** *** *** ******** ******* ****** than ****?

*** *** **** ***, ** **** **********, **** ******* ** its ************* ***** **** ******* ***** ** ******** *********** ****** in ***** *** *****. ** ***** ****?

Comments (7)

**: * **** *** ****! *** ***** ***** ******* **** companies.....

**: **** ****'* ******* ****

**: ****?

**: **** *** ********?

**: (***** *****)

*** **** **** *** **** ******? ;)

***** **** ** ** *********** *** ** *********** ************ ** create * ****** ****** ** *** ******** ** *** *** enabled *******, ***'*, ***'*, ****** *******, ***** *******, **** **********......**** breath, ********** ********, ******** ****** *****, ******** *** *******. **** sort ** *********** **** ****** **** ** *** **** ** Manufacturing * ****** *********** *********** **** *** *********. ** ****** with *** *** ****-*** ******** ****** *** *** *** **** the ****** ***** ** ** *** **** *** ***** #'*.

*** ************** ***** **** ***** ** **** ** *** ** Code ****** ** ******* ***** **********. *** ******* ******* **** IP66 ** **** ****** *** **** ******* *************, *** ** your ******** ******** ** ***'* ** ***** *** ** ***** then *** *** **** ** *** ****. ** ***** *** know *** *** *** **** *** ***** ***** ***** ********* to ***.

**** ***** ****** * *** **** ******* ** *** ****** especially ***** ****** **** *** ** ******* *** *** ** the *** ****** ****** **** *** ** ******** ** * smartphone (**** ********** * ****). **** *** ***** ****** "**** it ******* *** **** ***** *** **** ******** ********** ******* running **/* ******** *** **** ****** ****** ******* ********** *** exploiting **** *** ** ****** ******* ****'* **** **** *** programmed ** **?" **** **** **** *** *** ***** *** well **** ** ***** * ***** *** ****** ****** ***** be * ***** ** ********* ** ****.

******: *** *** ***** ***** ***** **** *****, ******* ***** has ***.

******: ******* ****** *** *** **** ***** ****-****, ********* *** login ****.

**** ****** ******** ************* ******** **** ******, *** ***** **** at * ****!

****, *** *** ** *** **** ** *** *** *** known ** *** ******** ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Guide

Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
Splicing Alarm Circuits Guide on Apr 23, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Burglar Alarm Screens Tutorial on Mar 14, 2017
Many residential alarm subscribers arm their alarms before going to bed at night. Wiring window screens allow these subscribers to leave their...

Most Recent Industry Reports

Pelco Shutting Down Clovis Line, Laying Off 200 on May 22, 2017
Pelco's Clovis facility once turned out some of the industry's most popular products. Now, the facility is mostly building "obsolete" equipment,...
IP Camera - 15 Year Shootout on May 22, 2017
How far have IP cameras come? We bought and tested 4 cameras across the past 15 years to understand how much and where performance has...
Remote Video Monitoring Providers Directory on May 21, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Forget The Backdoor, "ALL HIKVISION PRODUCTS" On Sale on May 18, 2017
Less than 2 weeks after the Hikvision Backdoor was confirmed, Hikvision has launched a sale "ON ALL HIKVISION PRODUCTS". In this note, we examine...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
Hanwha Recorder Vulnerability Analyzed on May 18, 2017
ICS-CERT has released a vulnerability notice for Hanwha SRN-4000 recorders.  Hanwha provided additional information to IPVM about this issue,...
DMP Video Doorbell / Access Reader Examined on May 17, 2017
Consumers increasingly demand video doorbells, with "doorbells selling like hotcakes, everyone wants a doorbell", according to ADT's CEO. At ISC...
ShotSpotter To IPO, Facing Low Revenue and Losses on May 17, 2017
A rare event for North American security manufacturers is upcoming. ShotSpotter is planning to IPO on the NASDAQ, aiming to raise $34.5...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact