Page 6 - Security Today, October 2017
P. 6

Products | Technology | Solutions
Data at Risk
Recent Headlines
Bluetooth Security Flaws Put Billions at Risk
No Security Threat for Winter Olympics in South Korea
Salt Lake City Security Guards Injured After Scuffle
How Apple’s New iOS Could Give You Better Data
New York Police Department Communication System Hacked http://securitytoday.com/news
Upcoming Webinars
Make No Mistake: PoE is a Business Saver
In this free webinar you will learn: How to save money, eliminate risk and disruption, and fast-track your IP migration. How to build a robust, highly-secure IP-enabled network platform that is easy to deploy and manage. How the most powerful Federal Agen- cy in the world uses these innovations to successfully migrate to IP and save money.
Becoming an Organizational Strategic Partner: Transforming the End User Relationship to Meet Today’s Business Needs Join Quantum Secure for this free informative discussion on how security integrators and consultants are uniquely positioned to ful- fill their role as a strategic partner, helping their customers lead the way to not only transform and elevate the security department but also the organization as a whole.
To view these Webinars at any time, please visit http://securitytoday. com/webinars.
REACTION Blog – Recent Posts
Remember, Never Forget
Security in the Eye of the Hurricane The Price of Security
To check out our most recent blogs, visit https://securitytoday. com/blogs/reaction/list/reaction.
Members of our staff and guest bloggers take advantage of REAC- TION to add their own perspectives on a broad range of security top- ics and issues. If you’d like to be a contributor, please contact Group Social Media Editor, Sydny Shepard at SShepard@1105media.com.
Online Communities
Follow us on Twitter:
www.twitter.com/SecurToday
Become a fan on Facebook:
www.facebook.com/SecurToday
Pin with Us:
http://pinterest.com/securitytoday/
Data security is a hot topic, especially after a large cyberattack happens. Currently the most concerning cyberattack is the Equifax hack in which an estimated 143 million customers have been affected. The cyber criminals were able to gain access to customers’ personal information, such as names, birthdays, addresses, driver’s license numbers and even their Social Se-
curity numbers. This is especially concerning given the fact that most Americans use Equifax to regularly check their credit scores, and in or- der to secure mortgage and car loans, and other advances from lenders.
Equifax has said that the hack happened through vulnerability on their website. The company has since hired a cybersecurity firm to review the cyberattack, and to determine the extent of the intrusion. The investigation is scheduled to take a few weeks, and Equifax will release more information as it becomes available.
With so many customers and companies that have been put at risk as a result of this data breach, it’s alarming that Equifax didn’t have more cybersecurity protocols at work. Maybe this will bring more at- tention to this problem and create more proactive measures from all parties—before another cyberattack of this caliber hits.
Our REACTION blog addresses current events and receives great feedback from our active online community. We’d like to invite you to check out our recent posts and share your thoughts. If you’re in- terested in contributing to our Online Exclusives or our blog, please contact me at lpage@1105media.com or 972-687-6784.
Best Regards,
Lindsay Page
Online Exclusives
How Cellular Technology is Transforming
Home Security and Alarm Panels
By Diego Grassi
The residential security and hybrid home automation market is cur- rently in a state of transformation, as conventional anti-intrusion technologies are giving way to a new generation of advanced smart home ecosystems. ABI predicts a growth rate of almost 500 percent in this emerging market between 2016 and 2020.
What Happens When Your Employees’
Equipment Is Left Unattended1?
The Importance of Locking Down Multiple Devices in the Office
By Louie Yao
The cost of replacing a laptop is rarely the principal cost incurred af- ter a theft. It’s not just the device, it’s the data. With an abundance of data stored on unsecured servers and sitting behind public storefront windows, corporate data hacks and thefts have been and will con- tinue to be devastating for businesses across a wide range of sectors.
http://securitytoday.com
6
1017 | SECURITY TODAY


































































































   4   5   6   7   8