Category Archives: Test

New Satellite Technology a Possible ‘Game Changer’ for Communications

As the interoperability discussion continues, so does the frustration of many who have worked on this issue for decades but haven’t seen their goals realized. So it makes sense to take a look into the future of what could be … Continue reading

Posted in Critical Infrastructure, Data, Failsafe, Fortify, Incident Response, Resilience, Satellite Broadband, Video Conferencing, WAN | Leave a comment

Enhancing Oil,Gas and Power Operations – SCADA via Satellite

Oil and gas operations are located in unforgiving environments, from the blistering cold of the arctic to the scorching heat of the deserts and the storming conditions out on the open sea. To sustain secure operating conditions in these remote … Continue reading

Posted in Critical Infrastructure, Failsafe, Fortify, Industrial Process Control, Network Management, Operational Efficiency, Power, Satellite Broadband, SCADA, WAN | Leave a comment

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

The Problem of Tailgating in Secured Buildings

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works … Continue reading

Posted in Building Management, Critical Infrastructure, Intrusion, Personnel Security, Physical Security, Security, Small Business Secure, Test, Threat Management | Leave a comment

Energy Retrofits and Building Automation Save the Life and Expenses of a Building

The environmental impact buildings have in the UK is at alarming levels — accounting for 40% of the nation’s energy usage and an equal percentage of carbon output, and, when you consider water consumption, waste management and vehicle transportation for … Continue reading

Posted in Building Management, Critical Infrastructure, Failsafe, Fortify, Intrusion, Maintenance, Operation, Operational Efficiency, Physical Security, Power, SCADA | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

Increase Guard Effectiveness with Breakthrough Real-Time Event Detection in Sheet Plants

Sheet plants are sensitive areas that need to be strictly protected. As potential targets for thieves or vandals as well as being extremely dangerous environments, even seemingly benign behavior can have seriously consequences. However, the cost of employing human guards, especially … Continue reading

Posted in Building Management, Incident Response, Industrial Process Control, Innovation, Larger Enterprise, Monitor, Personnel Security, Physical Security, SCADA, Security, Video, Video Surveillance | Leave a comment

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve. Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, … Continue reading

Posted in Access Control, Business Integration, Cloud Computing, Critical Infrastructure, Fortify, Infrastructure Security, Intrusion, Network Security, public cloud, Resilience, SCADA, Security, Small Business Secure, Software (SAAS), Test, Threat Management | Leave a comment

An examination of DHCP Snooping with option 82 on Cisco.

DHCP snooping is a DHCP feature that provides security by filtering untrusted DHCP messages from hosts or other devices on the network. DHCP snooping accomplishes this level of security by building and maintaining a DHCP snooping binding table. An untrusted … Continue reading

Posted in Access Control, Cisco, Data, Home Security, Infrastructure Security, Intrusion, LAN, LAN Switching, Network Security, Physical Security, Security, Small Business Secure, Tech Tips, Threat Management | Leave a comment

Hackers hit ‘at least five oil and gas firms

A report compiled by security firm McAfee, has revealed that hackers have run rampant through the networks of at least five oil and gas firms for years. The hackers exploited weaknesses by means of a combination of con tricks, computer … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, SCADA, Security, Threat Management, Web Security | Leave a comment