Page 6 - Security Today, August 2017
P. 6

Products | Technology | Solutions
Some American Pride
This month we’ve had quite an array of Online Exclusives. It was tough to choose which ones to feature, but I finally decid- ed on three. The first I’d like to talk about was written by Michael Lynch. He discusses SMS- based authentication, and in the world where texting is used constantly, I feel that this is a must read. Having a one-time passcode sent via text
message to recover a specific accounting, such as email, is a common practice. However, Lynch says this is not as foolproof as we might think, and hackers can easily intercept these messages. Next, we come to a story about video surveillance by Jason Spielfogel. He explains how to avoid mistakes right from the start—by proactive planning. And finally, I’d like to mention Robert Laughlin’s story about prod- ucts made in America. This is a unique story that it discusses the in- crease of demand in products made right here on American soil. For- eign companies are now seeing more value in “made in America” and we’re taking notice. American pride seems to be growing stronger.
Our REACTION blog addresses current events and receives great feedback from our active online community. We’d like to invite you to check out our recent posts and share your thoughts. If you’re in- terested in contributing to our Online Exclusives or our blog, please contact me at lpage@1105media.com or 972-687-6784.
Best Regards,
Lindsay Page
Online Exclusives
Quality, Flexibility and Service Create Trust and
Value for Made in America Products Overseas
By Robert Laughlin
While some companies manufacture products in China and other countries where low-cost labor is readily available, there is still a great deal of value in “Made in America.” Naturally, this sentiment is true here in the U.S., but you may be surprised to learn that the perceived value of American products overseas is equally high.
Great Systems Start with Great Planning
By Jason Spielfogel
The complexity and ongoing evolution of integrated systems has also created new challenges for system designers. To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages. Clearly identifying surveillance and security objectives, priorities, budget pa- rameters, potential installation/construction issues and future expan- sion plans are critical considerations. By taking the time at the start of the project to address these questions clearly—and gain agree- ment—users and/or integrators will be better ensured of developing and implementing a more innovative and comprehensive solution.
SMS-Based Authentication Is Imploding,
Precisely as Experts Predicted
By Michael Lynch
For a relatively long time it seemed as if the password problem had been solved using SMS text messages. Forgot your password? Don’t worry, we’ll send you a one-time passcode via text message.
Except there was a problem behind this security technique, one that was well known to security professionals. That is, SMS is not always a secure communication channel. Using vulnerabilities in the mobile data network known as Signaling System 7 (SS7), hackers can intercept, forward and relay text messages in a few simple steps.
http://securitytoday.com
Recent Headlines
Apple Sets Up China Data Center to Meet New Cybersecurity Rules Minneapolis Airport TSA Fails 95 Percent of Security Tests
U.S. Cities Add Security Measures to Protect from Vehicle Attacks http://securitytoday.com/news
Upcoming Webinars
Terrorism on Campus
Join us to explore the issue of terrorism specific to college campuses. We will examine the application of emergency management princi- ples as a tool to guide understanding, prevention and response.
The Future of Remote Monitoring Artificial Intelligence and IoT
In this free webinar you will learn how IoT, Augmented Reality, and Vir- tual Reality will play a critical role in Remote Monitoring of the future. To view these Webinars at any time, please visit http://securityto-
day.com/webinars.
REACTION Blog – Recent Posts
Payback is Never Good for Anyone
To check out our most recent blogs, visit https://securitytoday. com/blogs/reaction/list/reaction.
Members of our staff and guest bloggers take advantage of REAC- TION to add their own perspectives on a broad range of security top- ics and issues. If you’d like to be a contributor, please contact Group Social Media Editor, Sydny Shepard at SShepard@1105media.com.
Online Communities
Follow us on Twitter:
www.twitter.com/SecurToday
Become a fan on Facebook:
www.facebook.com/SecurToday
Pin with Us:
http://pinterest.com/securitytoday/
6
0817 | SECURITY TODAY


































































































   4   5   6   7   8