All posts by Roger Morency

National Cyber Security Awareness Month

October was National Cyber Security Awareness Month. As a trusted global leader, Tyco Security Products has developed a Cyber Protection Program and dedicated cyber protection team to lead the way in identifying, informing and developing cyber secure physical security products.

cyber awareness month_Future-threats

 

In case you missed any of our resources, here they are again:

Follow us to engage in the cyber security conversation and learn more about Tyco Security Products cyber protection program.

Distributed Denial of Service

If you were not already familiar with the term Distributed Denial of Service (DDoS), then over the past several weeks you probably have become aware of it through various news articles.

A few key points in the media about the DDoS attacks:

  • Some of the largest DDoS attacks ever launched[1] in late September
  • Release of the Mirai source code used to create the DDoS attacks in early October[2]
  • Growth of devices infected by Mirai malware is growing from 213,000 to 493,000, by mid-October[3]
  • Twitter, Netflix and PayPal and many popular site being unreachable for part of Friday as a result of a new DDoS attack[4]

Were Tyco Products Affected?
These attacks are of special interest for companies such as Johnson Controls because they were launched from botnets composed of “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders[5]There is no indication that any Tyco Security Products devices were involved in these attacks.

  • Illustra cameras are designed to prevent user access to the camera’s operating system and as a result of that decision: telnet is not available on any Illustra camera model.
  • VideoEdge NVRs do not support telnet. Also, all known botnet scanners look for a different version of Linux than used on VideoEdge.
  • iSTAR controllers do not support any remote access protocol and will not be detected by the malicious scanners.
  • DCM controllers, AC200 (RTC) Ethernet Controller and Emerald Intelligent, multi-function access terminals do not support Telnet
  • exacqVision network video recorders and video management system (VMS) software has SSH disabled making it unaffected.
  • Kantech  access control system also remains unaffected.
  • Applications such as AC2000, C•CURE 9000 and victor are not affected. These applications also do not require remote access protocols.

Background: What are Distributed Denial of Service Attacks?
If you are not familiar with a Distributed Denial of Service (DDoS) attack, it is an Internet attack, which typically targets websites in an attempt to bring down the site so that it is inaccessible to other Internet users.  It is a common tactic for activists and groups looking to suppress information or as a form of extortion; demanding money from the victim to cease to attack.  These attacks work by flooding the target website with large amounts of data, or requests for data, that use up a website’s resources. With a small attack, the site may appear to be slow, but large attacks can bring down a website making it inaccessible.

What is a botnet?
These recent attacks have used a ‘botnet’, or a network of devices, infected with malware. The attacker is able to remotely control the device. The owner of the device will not know it has been infected because the malware does not affect the devices normal operation.

This malware is only able to be loaded onto the device if it has a remote protocol such as telnet or SSH enabled on the device. Telnet and SSH are common among physical security products and devices with the protocols enabled will be detected by the scanner.  The Mirai malware uses a table of common factory default usernames and passwords to log into devices.

Recommendations for Installers and End Users
If you have a device which is using the default password and a remote access protocol enabled, you are at risk. To prevent your device from becoming a bot, you should immediately:

  • Disable remote access if it is not required.
  • Reboot the device. This does not have to be a factory reset, just turning the power off, wait a minute and turning it back on is sufficient
  • Change the password to a complex password. If you do not change the password or have a device that doesn’t allow you to change the password, you run the risk of becoming infected.

Again , the following Tyco Security Product devices are not affected:

  • Illustra Cameras
  • VideoEdge NVRs
  • iSTAR
  • DCM
  • AC2000 RTC Controllers
  • Emerald Intelligent Access Terminals

Sign Up to Receive Security Advisories
Tyco Security Products dedicated Cyber Response Team generates notices, typically within 24 hours, advising which products, if any, might be vulnerable along with mitigation steps. If it’s a critical security vulnerability, the team will develop, test and release patches to resolve issues.  Sign up to receive security advisories and access compliance guidelines. 


Sources:

[1] Wall Street Journal Sept 30th 2016 Hackers Infect Army of Cameras DVRs for Massive Internet Attacks http://www.wsj.com/articles/hackers-infect-army-of-cameras-dvrs-for-massive-internet-attacks-1475179428

[2] Wall Street Journal October 5th 2016 Hackers Release Botnet Code, Raising Specter of More Attacks ttp://www.wsj.com/articles/hackers-release-botnet-code-raising-specter-of-more-attacks-1475677667

[3] PC World October 18,th 2016 Hackers create more IoT botnets with Mirai source code http://www.pcworld.com/article/3132571/hackers-create-more-iot-botnets-with-mirai-source-code.html

[4] Wall Street Journal October 21st 2016 Cyberattack Knocks Out Access to Websites http://www.wsj.com/articles/denial-of-service-web-attack-affects-amazon-twitter-others-1477056080

[5] Krebs on Security October 21, 2016 Hacked Cameras, DVRs Powered Today’s Massive Internet Outage  https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/#more-36754

Cyber Security Assessment

Today’s businesses are faced with unprecedented threats from sabotage, theft of intellectual property and compromised sensitive data. Have you considered how your physical security products affect your cyber security?

TSP Cyber Protection Program Flowchart

 

Take a look at our infographic and assessment quiz to see if you are asking the right questions and taking the next step to be cyber secure.

Access the InfographicTake the Assessment Quiz
Learn more about Tyco’s industry-leading Cyber Protection Program.

Cyber Security Language

Security breaches are in the news today more than ever before. Security integrators and security officers must work with IT departments to ensure the physical security system is successfully deployed, maintained and upgraded on the network with minimal impact and without compromising network security.

cyber crime

To create a complete cyber secure environment, IT and security departments must effectively work together. However, physical security and IT often use the same words to mean different things – resulting in everyone being confused. Sometimes security integrators and security officers even avoid the IT department due to the misunderstanding.

For example, IP may mean intellectual property to a corporate security officer but internet protocol to IT security professionals. Or perimeter may mean the exterior building wall to the security officer and network connection to the outside to the IT professional.

To make sure all departments are speaking the same, common language, we suggest developing a list of terminology definitions that everyone can use.

Terms to be Clearly Defined:

  • IP
  • CredentialsTyco Security Products Cyber Protection Program
  • Key
  • Patch
  • Firewall
  • Vulnerability
  • Social engineering
  • Perimeter
  • Intrusion detection
  • Bandwidth
  • Directory
  • Security logs
  • Revocation
  • Signature

Having a common subset of terms will help you understand how to ask the right questions and quickly comprehend the answers. After establishing your company common language, clearly explain the information you need from IT to be able to define the network and security requirements.

Learn more about the Tyco Security Products Cyber Protection program.

Tyco Security Products Connected Partner Program

The Tyco Security Products Connected Program integrates with a range of third-party technology partners to create valuable security systems.  View all of our approved integrations on our new connected program compatibility matrix.

Connected Program

The new Connected Program compatibility matrix allows you to:

  • Select any integrated technology partner solution including access control, intrusion, video, fire alarm, RIFD and more
  • Quickly view integration details including driver version, certifications, supported server and client operating systems and more
  • Download integration details, release notes, user guides and additional resources

Our approved integrations are now displayed in a new compatibility matrix on the American Dynamics and Software House websites.

If you have any questions or comments, contact the Connected Program team at tspconnected@tycoint.com.

Save the Date and Join Us at ISC West

Tyco Security Products invites you save the date and visit us in booth No. 20005 at ISC West in Las Vegas on April 6 – 8, 2016Register today and get a free pass to the exhibit hall.

Booth

Whether you’re a dealer, distributor, consultant or integrator, the Tyco Security Products’ booth will provide you with in-depth knowledge of the latest product and technology advances in the electronic security arena.

ISC West

April 6 – 8, 2016
Sands Expo Center
201 East Sands Ave.
Las Vegas, NV 89109
Booth# 20005
ISC West Website
Register for Free
Register for FreeSchedule an Appointment to Talk to Us

The booth will cover the new and emerging technologies in video, access control and intrusion systems. See the latest products from our extensive brand portfolio, and our specialist experts will be on hand to discuss how solutions from Tyco Security Products can assist with any current or future projects you may have.

Complete

Schedule an Appointment to Talk to Us

The Tyco Security Products Road Show is Coming to Texas

Complete & Unified Security Solutions

Tyco Security Products presents its new complete and unified security solution to Texas. Hear from Tyco leaders and end users, network with industry professionals and see a demo of our latest product innovations.

Roadshow
Our Roadshow includes:

Event Details
The Colony TopGolf
3760 Blair Oaks Drive
The Colony, TX 75056

March 16, 2016
9:00 a.m. – 4:00 p.m. (CST)
Venue Info
Agenda
Lunch will be served
Register
Register

Register for this event today and learn more about our complete security solutions.

Tyco Security Products Showing Smart Home Solutions at CES 2016

CESTyco Security Products will showcase smart home solutions in our debut appearance at the 2016 CES show, January 6-9, 2016 in Las Vegas. CES  provides an ideal platform to feature the company’s expanding range of technology-inspired products and capabilities for the smart home.

IQ Panel

Highlighting the CES booth will be:

  • The IQ panel, which coupled with Alarm.com’s interactive service, enables homeowners to:
    • remotely arm and disarm their security systems
    • view camera feeds
    • receive event notifications and system status updates
    • control lights, locks, thermostats and other home digital devices.
  • A wide range of sensors and other peripherals which integrate with the IQ panel, including:
    • smart door sensors
    • window contact sensors
    • other smart sensors
  • A full portfolio of security grade home automation/smart home sensors which work across the broad portfolios of smart home ecosystems

Smart HomeTyco Security Products brings its deep experience in home security to many aspects of the smart home environment. As part of its strategy to leverage open standards for unified IoT adoption, Tyco serves on the Board of Directors and as a sponsor of The Thread Group, the not-for-profit consortium responsible for market education around the Thread networking protocol, which connects products in the home. Tyco Security Products delivers the broadest connected home connectivity portfolio, with products that support technologies like Thread, ZigBee, Zwave, WiFi and PowerG. The company’s solutions also enable interactive services as well as smart home and home automation services — partnering with companies like Alarm.com, iControl, ADT (Global), Works with Nest, Telguard, SmartThings, IFTTT, and others.

Solutions from Tyco Security Products will also be featured in other areas on the CES show floor, including a technology demonstration sponsored by The Thread Group at booth 70560, as well in the Texas Instruments (TI) Village, located off the show floor in the Las Vegas Convention Center’s North Hall in rooms N115-N120.

For more information on smart home solutions, visit us at CES booth #71557 in the Sands Expo.  For more information on Tyco Security Products, visit www.tycosecurityproducts.com.