Articles by Iain Deuchars
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
ComNet, a globally renowned company in transmission solutions across fiber optic, copper, Internet, and wireless mediums, has announced the launch of Razberi Monitor software. Razberi Monitor is the latest addition to the ComNet product portfolio and the first solution to be rolled out from the recently acquired Razberi brand. Razberi Monitor Razberi Monitor is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. It monitors and manages all the system components for both cyber security and system health, and can be deployed from the Cloud or on-premise. Iain Deuchars is the General Manager of ComNet International. Commenting on the launch of the product, Iain Deuchars said, “This software has been purpose-built for security professionals. It provides secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Not only that, but it predicts and prevents problems while providing a centralized location for IT departments to view video data.” Protection against cyber-attack vulnerabilities The benefit of having Razberi Monitor ensures shorter response times to cyber security events" A vital benefit of the solution is that it protects against the multiple commonly cited cyber-attack vulnerabilities. These include weak passwords, the failure to update software or firmware, the lack of best practices for routine maintenance, and not aligning with network IT policy. Iain Deuchars weighs in further, by stating “The benefit of having Razberi Monitor ensures shorter response times to cyber security events, along with real-time alerts and logs to proactively notify users of active threats. The fact that it can detect cyber posture and problems with servers, cameras, and other IoT devices in real time is a promising unique selling point for the ComNet brand. We are very excited to deliver this product to our loyal customer base.” Enhancing cyber security Mike Issa, ComNet’s Region Manager for South Europe, the Middle East, and Africa, points out that Razberi Monitor can be offered to enterprises as a managed service, with a monthly subscription. This means no significant upfront costs and the ability to free up cash flow. He said, “The addition of Razberi to the ComNet portfolio is a great step forward for us as a brand. This software will optimize and secures networks, reducing costs, time, and manpower required to install and manage an enterprise network.” Protecting networks from cyber threats Mika Issa adds, “Moving forward, I am confident that Razberi will provide a unique selling point for integrators and end customers wishing to protect their security systems with cyber security solutions that can deter, detect, delay, deny and defend against hackers.” Razberi Monitor is available to view on the newly launched ComNet webshop.