Storage - Expert commentary

Hybrid Working And The Threat Of Desk Data
Hybrid Working And The Threat Of Desk Data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.

Data-at-rest Encryption: At The Center Of The Security Circle
Data-at-rest Encryption: At The Center Of The Security Circle

The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.

The Many Faces Of Today's Facial Recognition Technology
The Many Faces Of Today's Facial Recognition Technology

The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights.  The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry.   Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers   Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources.   Facial recognition allows officers to identify an individual faster and more accurately than the human eye While some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings.  At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.

Latest FLIR Systems news

Teledyne FLIR Releases FLIR MR265 Moisture Meter And Thermal Imager With MSX®
Teledyne FLIR Releases FLIR MR265 Moisture Meter And Thermal Imager With MSX®

Designed to visually scan large areas for moisture issues, air leaks, electrical problems, and more, the FLIR MR265 Moisture Meter and Thermal Imager with MSX empowers professionals to quickly identify and locate water leaks and other moisture issues at the source. This dual thermal imager and measurement tool combine a 160x120 resolution Lepton® thermal camera, visual camera, laser pointer, and both pin and pinless moisture detection for faster leak identification and measurement, plus offers easy reporting through the FLIR Thermal Studio Suite™. Home inspectors, contractors, and other professionals who want to consolidate tools without jeopardizing function will appreciate the multiple ways to read and report moisture levels with the MR265, as well as identify temperature anomalies that could denote issues from leaking pipes, to overheating circuits, to inefficient windows and doors. Multi-spectral dynamic imaging enhancement When compared to traditional non-thermal imaging moisture meters, inspection time is significantly decreased with the MR265. Its ability to emboss edge detail from a two-megapixel visible camera onto the thermal image, via MSX, provides the user significantly more detail and context on screen and in saved images to identify issues quickly and efficiently. Pin and pinless moisture measurement The MR265 also offers flexibility in identifying moisture issues—providing both pin and pinless capabilities. The pinless option can provide qualitative measurements through an integrated sensor for situations where a more invasive method either isn’t possible or would cause unwanted damage. Conversely, pin measurements produce quantifiable measurements using a resistive sensor that can pierce cavities and other suspected moisture spots within walls, ceilings, and floors. When used with the thermal imager, operators can scan an entire interior wall to narrow down the moisture location, use the integrated sensor to pinpoint the source of water intrusion, and then measure the exact amount of moisture without requiring unnecessary demolition. Functionality can be further expanded through six compatible accessory probes and sensors available for the MR265, such as the FLIR MR08 hammer and wall cavity probe combo and the FLIR MR05 impact pin moisture probe. FLIR Thermal Studio Suite Streamlined reporting capabilities through FLIR Thermal Studio Suite can also decrease diagnostic and reporting time Streamlined reporting capabilities available through FLIR Thermal Studio Suite can also decrease diagnostic and reporting time. Users can directly upload thermal JPEGs with the included USB cable to either FLIR Thermal Studio or a compatible reporting solution. They can also produce thermal, MSX, visual image reports, or before-and-after reports containing all three types of images through the FLIR software. This can help users more easily communicate pre-and post-repair activity, ultimately providing peace of mind that issues relating to rot, mold, electrical, or energy inefficiencies have been identified and remedied. Easy to carry “Using the MR265 is great because it can read moisture levels in a couple of different ways and using the onboard thermal camera with the laser, I can find temperature anomalies in circuit breaker boxes faster than ever.” “It’s not too big, so it is easy to carry in my satchel. It’s a tool that has more than one function, so I don’t have to carry as many different tools with me. This is a great addition to my inspection tools. I like this tool very much,” said Terry Meyer, Home Inspector, Metro Home Inspections.

Teledyne FLIR Announces The Launch Of FLIR MR265 Moisture Meter And Thermal Imager With MSX
Teledyne FLIR Announces The Launch Of FLIR MR265 Moisture Meter And Thermal Imager With MSX

Designed to visually scan large areas for moisture issues, air leaks, electrical problems, and more, the FLIR MR265 Moisture Meter and Thermal Imager with MSX empowers professionals to quickly identify and locate water leaks, and other moisture issues at the source. This dual thermal imager and measurement tool combines a 160 × 120 resolution Lepton thermal camera, visual camera, laser pointer, and both pin and pinless moisture detection for faster leak identification and measurement, plus offers easy reporting through the FLIR Thermal Studio Suite. FLIR MR265  Home inspectors, contractors, and other professionals who want to consolidate tools without jeopardizing function, will appreciate the multiple ways to read and report moisture levels with the MR265, as well as identify temperature anomalies that could denote issues from leaking pipes, to overheating circuits, to inefficient windows and doors. When compared to traditional non-thermal imaging moisture meters, inspection time is significantly decreased with the MR265. Its ability to emboss edge detail from a two-megapixel visible camera onto the thermal image, via MSX, provides the user significantly more detail and context on screen and in saved images to identify issues quickly and efficiently. Pin and pinless moisture measurement The MR265 also offers flexibility in identifying moisture issues, providing both pin and pinless capabilities The MR265 also offers flexibility in identifying moisture issues, providing both pin and pinless capabilities. The pinless option can provide qualitative measurements through an integrated sensor, for situations where a more invasive method either isn’t possible or would cause unwanted damage. Conversely, pin measurements produce quantifiable measurements using a resistive sensor that can pierce cavities and other suspected moisture spots within walls, ceilings, and floors. When used with the thermal imager, operators can scan an entire interior wall to narrow down the moisture location, use the integrated sensor to pinpoint the source of water intrusion, and then measure the exact amount of moisture without requiring unnecessary demolition. Functionality can be further expanded through six compatible accessory probes and sensors available for the MR265, such as the FLIR MR08 hammer and wall cavity probe combo and the FLIR MR05 impact pin moisture probe. FLIR Thermal Studio Suite Streamlined reporting capabilities available through FLIR Thermal Studio Suite can also decrease diagnostic and reporting time. Users can directly upload thermal JPEGs with the included USB cable, to either FLIR Thermal Studio or to a compatible reporting solution. They can also produce thermal, MSX, visual image reports, or before-and-after reports containing all three types of images through the FLIR software. This can help users more easily communicate pre- and post-repair activity, ultimately providing peace of mind that issues relating to rot, mold, electrical, or energy inefficiencies have been identified and remedied.

Teledyne FLIR Launches A500f/A700f Cameras For Fire Detection And Condition Monitoring
Teledyne FLIR Launches A500f/A700f Cameras For Fire Detection And Condition Monitoring

The FLIR A500f and A700f Advanced Smart Sensor ruggedized thermal cameras feature high-temperature detection for extreme environments paired with on-camera analytics and alarm capabilities – ideal for industrial early fire detection or outdoor condition monitoring applications. Along with enhanced spot, area, line, polygon, and polyline analytic functions that improve the definition of areas of interest and object curvatures, the A500f/A700f can help commercial and industrial organizations protect assets, improve safety, maximize uptime, and minimize maintenance costs. Fire detection and condition monitoring For early fire detection, the A500f and A700f thermal cameras can quickly identify increased temperatures related to potentially dangerous conditions. If smoke is present, the cameras can help provide increased awareness for decision-makers to properly assess and address incidents. Both cameras feature Flexible Scene Enhancement (FSX) technology, found on Teledyne FLIR K-Series handheld firefighting devices. The result is an ultra-sharp, finer-textured image that shows subtler edge details supplied by the embedded visible camera onto the thermal image, enabling operators to recognize objects and people more easily.   Reduces maintenance costs The cameras are effective tools for pile-burn monitoring, providing automated early warnings for waste management The A500f/A700f are also effective tools for pile-burn monitoring, providing automated early warnings for potential issues in waste management facilities or coal collection areas that operate around the clock. Manufacturing facilities, chemical processing locations, or power substations that use common communications and control language can also benefit from the A500f and A700f beyond fire detection. These cameras empower those organizations to reduce maintenance costs by identifying heat anomalies from mechanical problems early, thereby extending the life of plant components while maximizing uptime. Effective ruggedness and thermal range Featuring a protective IP67-rated housing designed to withstand temperatures between -30° to 50°C (-22° to 112° F), the A500f/A700f cameras are designed for harsh environments and discreet enough to deter from theft. In addition, the cameras use a single power-over-Ethernet (PoE) cable for both power and communication, helping to further minimize points of potential failure. The A500f/A700f offers superior thermal imaging capability with a resolution of 464 x 348 (161,472) for the A500f and 640 x 480 (307,200) thermal pixel resolution for the A700f. Users can expect a ±2° C (±‐3.6° F) temperature measurement accuracy.  A500f/A700f offers superior thermal imaging capability with a resolution of 464 x 348 for the A500f and 640 x 480 for A700f The A500f has a temperature detection range between -20° to 1500°C (-4° to 2732° F), while the A700f offers a temperature range of between 20° to 2000°C (68° to 3632°F) for detecting chemical fires and other extreme industrial fire conditions. Along with thermal lens options ranging from 14° to 42° and an embedded HD visible camera, these devices fulfill the needs of most outdoor condition monitoring and fire detection applications. Seamless integration and set up Installing the FLIR A500f/A700f cameras is seamless. Both cameras are ONVIF compliant and integrate easily into standard security VMS and NVR solutions including control of pan/tilts. For VMS integrations, thermal and visible streams can be viewed independently or simultaneously. The cameras are easy to add, set up, and operate in HMI (Human Machine Interface) SCADA (supervisory control and data acquisition) systems, offering automation system solution providers a running start. Both the A500f and A700f fully support IIoT protocols such as MQTT (Message Queuing Telemetry Transport) and RESTful API with a system unique token key for extra security.

Related white papers

Hybrid Hyperconverged Systems Benefit Growing Storage and Retention Needs

Five Things To Consider For AI With Video Technology

Making Your Surveillance Cyber Secure