Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

1 min read

DoD Biometric Reader with Data On It Sold on eBay!

You read that right! The DoD apparently sold a biometric reader with personal data on it as investigated by German researchers and as reported by Gizmodo. That caused us to pause and think about how that situation could be replicated in a commercial access control environment. 

This unfortunate situation does bring up an interesting concern when it comes to commercial access control solutions - is biometric data being safeguarded? Biometric data is considered personally identifiable information (PII) and should be kept very secure. Especially considering the permanence of stolen or compromised biometric data and scans. Biometric scans are only as secure as the as organization administering the scan, therefor, controlled physical access, device selection, software platform, strong password requirements, and other cyber security measures can be imperative to the security of a solution.

Biometrics are an excellent form of authentication as they are a biological piece of the individual seeking access to a secure area. In our engineered security designs, biometrics are distanced from direct association with an individual. The best practice is to implement biometrics on the inner rings of the concentric security concept. The SEEK II device in the article we sited, it was physically compromised before the data was compromised. This is why we must distance personnel and data from potential adversaries with other means of physical access control. 

Fortunately, we believe most organizations should be safe from this happening, assuming they are using top-tier access control solutions paired with biometric devices and have implemented appropriate cyber security measures.

Not sure if your facility is using biometrics properly or safely? Give us a call or send us an email to discuss how we can help your organization.

Contact us here >>

Theseus dialog bubble-1

 

A Clear View

You may be one of millions that caught this scene from The Masters last week. If so, did you think of this as an inspirational moment for your...

Read More

Integrating Disparate Low Voltage and Electronic Security Systems

The trend towards integration of disparate security systems to create a unified solution has gained significant traction over the years. This...

Read More

Explained: Piggybacking versus Tailgating

When it comes to securing sensitive areas of a building, the terms "piggybacking" and "tailgating" often come up. Although they might seem similar at...

Read More