Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

1 min read

DoD Biometric Reader with Data On It Sold on eBay!

You read that right! The DoD apparently sold a biometric reader with personal data on it as investigated by German researchers and as reported by Gizmodo. That caused us to pause and think about how that situation could be replicated in a commercial access control environment. 

This unfortunate situation does bring up an interesting concern when it comes to commercial access control solutions - is biometric data being safeguarded? Biometric data is considered personally identifiable information (PII) and should be kept very secure. Especially considering the permanence of stolen or compromised biometric data and scans. Biometric scans are only as secure as the as organization administering the scan, therefor, controlled physical access, device selection, software platform, strong password requirements, and other cyber security measures can be imperative to the security of a solution.

Biometrics are an excellent form of authentication as they are a biological piece of the individual seeking access to a secure area. In our engineered security designs, biometrics are distanced from direct association with an individual. The best practice is to implement biometrics on the inner rings of the concentric security concept. The SEEK II device in the article we sited, it was physically compromised before the data was compromised. This is why we must distance personnel and data from potential adversaries with other means of physical access control. 

Fortunately, we believe most organizations should be safe from this happening, assuming they are using top-tier access control solutions paired with biometric devices and have implemented appropriate cyber security measures.

Not sure if your facility is using biometrics properly or safely? Give us a call or send us an email to discuss how we can help your organization.

Contact us here >>

Theseus dialog bubble-1

 

Sometimes a Fence is All You Need - Perimeter Security Design Principles

Sometimes it's just better to let the fence do its job! 

{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True,...
Read More

Ashlyn McGovern Attends GSX 2024

Attending the Global Security Exchange (GSX) for the first time was both exhilarating and overwhelming. As soon as I walked into the convention...

Read More

Enhancing Hospital and Campus Security Through Systems Integration: Best Practices and Key Benefits

Security is no longer just about monitoring doors or cameras in isolation. Modern hospital and campus security demands a holistic approach that...

Read More