off

From Firewalls to Fine Grain Permissions: Cyber Security Best Practice

Cyber crime is now so prevalent that guarding against it should be part of standard ‘business as usual’ company procedures, but many organisations have been – and continue to be – caught out. In parallel, the risk of physical attacks remains the same, which means that the risk...
Posted On 26 Jul 2019
off

Dedicated app and integration with Milestone Access for Inner Range’s Inception

Inner Range’s award-winning Inception entry-level access control and security alarm system has been upgraded with a new dedicated app and the ability to integrate with the Milestone Access platform. Existing and prospective end users can now use the Sky Command App to control...
Posted On 12 Jun 2019
Paul Darby
off

Outdated VPN Remote Access: Putting CNI Organisations at Risk

When Virtual Private Networks (VPNs) were first developed back in the 1990s, the idea was to extend the LAN to employees’ home offices and hotels as they hit the road. This meant giving employees remote access to everything their company network had to offer, just as if...
Posted On 16 Jul 2018
Duncan Cooke
off

Mission-Critical Security: The ‘Availability’ Jargon Buster

Does it really matter if the software applications supporting your security systems are only available for 99% of the time? Well, it probably doesn’t if you’ve installed a video surveillance system primarily to deter shoplifters, but the loss of what equates to more than 90...
Posted On 03 Jan 2018
off

Simulated investigation staged at BT Tower in bid to unearth cyber recruits

Telecoms giant BT and the Cyber Security Challenge UK have staged a mock investigation into a cyber attack at London’s iconic BT Tower in a bid to find the country’s best hidden cyber security talent. No fewer than 24 of the brightest candidates from a series of online qualifying...
Posted On 26 Apr 2016
Schematic of the LINKLOCK security solution developed by Veracity
off

LINKLOCK network protection from Veracity supports Video-over-IP systems for end users

The availability of IP network-based video surveillance systems has transformed the way in which businesses are able to make the best use of resources in ensuring that their assets are protected and that staff can work in a safe and secure environment. A key feature of...
Posted On 15 Sep 2015