Our Cyber Security Approach

Our Cyber Security Approach image

Over the years, computing and networkable technologies have become embedded within most organisations and have revolutionised previous business strategies. Many companies now depend on networkable technologies as a catalyst to generate new businesses, as well as being a driving force for successful internal organisation and communication.

For many of us CCTV security had been regarded as an electronic technology, comprising of closed circuit analogue cameras. These cameras were completely isolated from outside networks and could only be managed from within a control/security room, thus hacking into the surveillance system was considered difficult. However, the functionality of analogue CCTV was limited and the switch over to IP allowed users to benefit from higher definition recordings and remote connectivity, allowing users to view their systems from anywhere.

With the growing reliance towards networkable technologies, businesses have become more exposed to the cyber security threats. Networkable IP based security systems are especially vulnerable to the threats, and the usage of IP security systems to carry out large scale cyber-attacks.

Following the transition of IP technology and development of risks around this, WOT have invested in hiring a team of computer science graduates into the organisation. These graduates have collectively formed a complete cyber security installation handbook for engineers to follow. These standards have been selected to significantly reduce the immediate threat of cyber security attacks.

Our three-layer approach to cyber security incorporates:

Password protection policy
Network hardening methods
Approach to system design

The password protection policy we have created, allows us to assign each site a unique administrator password which will be secure and importantly unique. Additionally, we will never recommend manufacturers who have not implemented password authentication delay, protecting the system against brute force attacks.

Within our secure staging facility, we introduce multiple network hardening methods to security devices. With use of this facility we can now ensure complete system compatibility and functionality, mitigating any potential issues that can occur during installation before we attend site. Our network hardening processes includes but is not limited to, installing the latest firmware and software, disabling unused ports, services and protocols and the assigning of relevant IP addresses.

Our approach to system design incorporates 35+ years industry experience allowing us to provide quality security consultation throughout an entire project lifecycle. To each site we offer a full site survey, which enables us to produce a complete project analysis. Detailed findings are then transferred to our applications department, who provide further technical consultation, which encapsulates system recommendations and value engineering. This standardisation allows us to consistently provide, turn-key, cyber secure security solutions.