PART 2 - 7 Reasons Why Hiring a Security Consultant Makes Sense Over DIY Security Camera PurchaseS
In PART 1 of this 2-part series, we outlined the Top 9 considerations when selecting a security camera for your facility. But, selecting the right...
Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.
This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.
1 min read
Theseus Team : Dec 29, 2022 7:45:00 AM
You read that right! The DoD apparently sold a biometric reader with personal data on it as investigated by German researchers and as reported by Gizmodo. That caused us to pause and think about how that situation could be replicated in a commercial access control environment.
This unfortunate situation does bring up an interesting concern when it comes to commercial access control solutions - is biometric data being safeguarded? Biometric data is considered personally identifiable information (PII) and should be kept very secure. Especially considering the permanence of stolen or compromised biometric data and scans. Biometric scans are only as secure as the as organization administering the scan, therefor, controlled physical access, device selection, software platform, strong password requirements, and other cyber security measures can be imperative to the security of a solution.
Biometrics are an excellent form of authentication as they are a biological piece of the individual seeking access to a secure area. In our engineered security designs, biometrics are distanced from direct association with an individual. The best practice is to implement biometrics on the inner rings of the concentric security concept. The SEEK II device in the article we sited, it was physically compromised before the data was compromised. This is why we must distance personnel and data from potential adversaries with other means of physical access control.
Fortunately, we believe most organizations should be safe from this happening, assuming they are using top-tier access control solutions paired with biometric devices and have implemented appropriate cyber security measures.
Not sure if your facility is using biometrics properly or safely? Give us a call or send us an email to discuss how we can help your organization.
In PART 1 of this 2-part series, we outlined the Top 9 considerations when selecting a security camera for your facility. But, selecting the right...
Selecting a security camera system for any facility, whether a corporate office, data center, or hospital, involves more than just picking a device...
The field of physical and electronic security is undergoing significant transformations, particularly in how we engage with these systems. Recently,...