SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibaba Wan2.6: Next-Gen Visual AI Revolution
    • AI Transformation In Video Surveillance By Hanwha Vision
    • CII Recognizes Matrix Comsec For Innovation Excellence
    • i-PRO's 2026 Security Tech Predictions: AI & Cybersecurity
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which Vertical Markets Have The Greatest Growth Potential For Security?
    • What’s Behind (Perimeter) Door #1?
    • Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft
    • Why Open Matters In The Age Of AI
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

11:11 Systems Commentary For MGM Attack

15 Sep 2023

11:11 Systems Commentary For MGM Attack
Contact company
Contact 11:11 Systems
icon Add as a preferred source Download PDF version
Related Links
  • AFS Modernises Disaster Recovery Strategy In The Cloud With 11:11 Systems
  • 11:11 Systems Launches Managed SteelDome For On-Premises Data Storage, Protection And Recovery
  • New Products And Beyond At GSX 2023 In Dallas
  • Exploring Evolving Trends In Data Security: Unveiling Key Developments

Johnny Carpenter, General Manager of EMEA Commented: “The news this week of yet another cyberattack on MGM Resorts, initiating a system shutdown and disrupting its operations, is yet another in a very long list of attacks that we have witnessed in the past couple of years. Having the right preventive and defensive cybersecurity measures in place for such attacks is a given, and it is what most organizations focus on. But it is also about understanding how the organization will recover from an incident and how they can limit the extent of an attack."

He adds, "Today, being impacted by a cyberattack is almost inevitable. Therefore, companies also need to think about how they can proactively recover, how quickly they can recover, and the cost of recovery to the business. For MGM the priority now will be to stabilize infrastructure, while they find the best copy of their data and restore and continue to drive business operations, bringing systems back online as quickly as possible."

Cybersecurity incident

Interruption to operations caused by a cyberattack can cost businesses an enormous amount"

Johnny Carpenter continues, "Here at 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and more. We also understand how important it is for organizations to recognize the difference between traditional disaster recovery, in response to incidents such as wildfires, earthquakes, and extreme weather conditions, and compromised data recovery in the event of a cybersecurity incident." 

He concludes, "We’re keen to help educate the market in understanding their own capabilities to get back to business-as-usual post an attack. An interruption to operations caused by a cyberattack can cost businesses an enormous amount, financially and reputationally, so this type of intelligence is vital. In today’s world of heightened attacks, you need a multi-disciplinary layered approach involving ongoing diligence, training and investment, if you are going to be ready to minimize business interruption from a cyber event as well as proactively prevent your company from becoming the next cyberattack headline.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Remote video surveillance
  • IP video surveillance
  • Airport security
  • Application security
  • Remote security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security access systems
  • Radio frequency Identification
  • Network monitoring
  • Video analytics
  • Remote video monitoring
  • Security guards
  • Security seals
  • Institute security
  • Wireless security
  • Network cameras
  • Security software
  • IP Surveillance
  • IP security solutions
  • Security communication
  • Integration software
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Network Video Recorders
  • IP transmission
  • Security Assessments
  • Artificial intelligence (AI)
  • Touchless Security
  • Related categories
  • Bollards
  • Barricades
  • Gates
  • Storage
  • Barriers
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
AI Transformation In Video Surveillance By Hanwha Vision

AI Transformation In Video Surveillance By Hanwha Vision

i-PRO's 2026 Security Tech Predictions: AI & Cybersecurity

i-PRO's 2026 Security Tech Predictions: AI & Cybersecurity

Videonetics AI Video Analytics At Partner Connect 2025

Videonetics AI Video Analytics At Partner Connect 2025

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Corporate news
About this page

"Explore the importance of cybersecurity with 11:11 Systems as we navigate through effective preventive measures, speedy recovery and ongoing diligence in the wake of MGM cyberattacks."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec