News

NHS Fails To Secure Data On Mobile Devices

A survey into ‘Mobile device usage in the healthcare sector’ carried out by the British Journal of Healthcare Computing & Information Management has revealed that one fifth of the devices used to store data have no security on them at all and a further two fifths have only password-controlled access, which does not guarantee security from hackers. Using basic hacker software downloaded from the Internet it would take a few seconds to bypass a basic password. Just a quarter of respondents used passwords with another form of security, including biometrics, encryption, smart card and two-factor authentication. Respondents included information managers, IT managers, medical professionals and a range of other job titles. Two thirds of the 117 who responded to the survey were in the NHS and a quarter were suppliers to the sector. USB memory sticks/memory cards (76%) were the most popular mobile device to be used to download data in the healthcare sector followed by laptop/tablet PC (69%), PDA/Blackberry (51%), smartphone (9%) and mobile phone (2%). Advances in technology have resulted in the ability to store gigabytes of information not just in these devices but also MP3 music players, cameras, voice recorders etc. The easy availability of tiny, high capacity storage devices such as USB memory sticks and memory cards makes it very easy for a person to carry unnoticed large amounts of data such as patient records or sensitive corporate data. Overall, 42% of respondents owned at least one of the devices they used, but half of the NHS respondents were using their own devices to aid them in their everyday work. The most common type of data stored was personal contact details (80%), while three quarters stored work contact details. Nearly two thirds stored corporate data and an amazing fifth of the healthcare workers who were interviewed held security details – which could include passwords, PIN numbers and bank account details. About half of the medical professionals carried patient records on a mobile device. The majority of medical professionals used a password alone for security. One Doctor commented that his security was okay because he used "the initials of one of his patients as his password". Two-fifths used higher levels of security, but a small number had no security at all. Comments from respondents included a claim that there was minimal chance of loss or theft and a minimal chance of misuse. Another wrote "my patients couldn’t afford to pay for blackmail and they probably wouldn’t care if others knew" [about their medical records]. A couple thought that the risk to security was no worse than having information on paper. Over half expressed anxiety that patient details are being held on mobile devices. The biggest concerns were that if a device is lost or stolen it would breach patient confidentiality (57%) and that the information "could get into the wrong hands and be abused" (50%). This still leaves, however, a large number who didn’t show any concern and thought that security was adequate. The number of devices that have been lost is surprisingly high. A quarter of respondents had lost a device themselves, and a similar number knew of a colleague who had lost one. However, about half found their devices again and none said there were any consequences from the loss. A small number of colleagues, however, were subject to disciplinary action and one, who had lost a PDA belonging to a local authority chief executive had even lost their job. The survey shows that a large number of people are using their own devices for carrying data such as work contacts, corporate data and even medical records, which is a basic failure of security policy. Two thirds of the devices have no or inadequate security and there appears to be a lack of appreciation of the security risks among a large number of users. About 80% said that there was a security policy in their organisation, but the results of the survey show clearly that there is widespread and serious failure in the way that security policies deal with the risks of mobile devices and are enforced. If you are looking to increase the security of your PC or laptop, Tensor supply biometric fingerprint logon devices used in conjunction with a password to safeguard your data.
News

Getting Back To Business With Biometrics

People and passwords – in the long run, they just don’t work very effectively together. Recently, a network password cracker was run as part of an enterprise security audit to see if employees were adhering to advanced password policies, and guess what… it found that they weren’t. Within 30 seconds, 80 percent of people’s passwords were identified. Immediately, those same employees were asked to create strong passwords that adhered to the security requirements. A few days later, the password cracker was run again: This time, 70 percent were cracked. The difficulty seems to be that employees are unable to maintain strong passwords, and those that did forgot them, so they would have to be reset. The use of biometrics – the mathematical analysis of characteristics such as fingerprints, veins in irises and retinas, and voice patterns – as a way to authenticate users’ identities has been a topic of discussion for years. Early commercial success stories have largely come from applying biometrics to projects with provable returns on investment: time and attendance, password reduction and reset, and physical access control. Tensor have developed a low-cost biometric logon device which provides a competent alternative to reliance on a username and password system. Biometric fingerprint recognition devices can be connected to any PC or laptop, and provide the effective two-factor authentication process that virtually eliminates the possibility of an intruder hacking into your system. The most mature applications of biometric technology are in systems that control physical access to facilities and keep records of time and attendance. Over the last few years Tensor has rolled out fingerprint-based network and systems across the UK. Incorporated into time and attendance, access control and visitor monitoring systems, the combination of biometrics with smart cards has taken the private sector by storm. Even the public sector are getting on the bandwagon – Tensor’s biometric prison visitor monitoring system has received unprecedented demand, and is now approaching 20 installations in prisons across the UK. Fingerprint biometrics are largely used as part of an authentication process for providing personnel and associates with smart cards for physical and network access. With the Enterprise range of products suitable for implementation across multiple sites, Tensor provide a proprietary biometrics system that works over multiple bases. If you are interested in finding out more about Tensor’s biometric product range, don’t hesitate to contact a member of our sales team who will be happy to provide information and advice.
News

Tensor Gain CPD Certification

The CPD Certification Service encourages the provision and assists in the dissemination of high quality, independently certified Continuing Personal / Professional Development (CPD) throughout a wide range of industry sectors. Tensor have been cited as an important source of technical and educational information due to our specialist knowledge of the security industry within the UK. Often called up to provide presentations on our products and services to other members of the security industry, Tensor PLC have also become involved in providing materials compliant with CPD guidelines. These guidelines support the further learning initiatives being undertaken by organisations in both the public and private sector. All professionals need to adapt to the rapidly changing environment within which they work. A commitment to CPD ensures that each individual is equipped with the skills, knowledge and confidence to achieve adaptability. CPD Certification underlines Tensor’s commitment to investment in our products, services and employees, and ensures that we remain one of the leading authorities within the security industry. Tensor was certified by the CPD Certification Service in June 2006.
News

Respecting Employee Privacy Rights

The loss of employee privacy rights in the workplace is a growing concern among employees, lawyers, and civil libertarian groups. Although employers in banks, telecommunications, securities exchange, in hi-tech industries, and in other workplaces justify using video surveillance in the workplace to monitor employee behavior to chiefly promote safety, improve productivity, and stop theft, protecting employee privacy must be a top concern. If the courts find that the employer’s surveillance methods are less than fair, that firm may find itself knee-deep in lawsuits that could have been prevented. Employers install hidden surveillance cameras for many good reasons such as preventing theft, promoting productivity or protecting employees. However in some cases, the very systems installed to protect will intrude upon employee privacy. Legal observers and human resource specialists who study workplace privacy believe that employee privacy intrusions are more common than previously observed, and that they will increase every year. According to a 2005 survey, more than half of the companies surveyed use video monitoring to prevent theft, violence and sabotage (51% in 2005 vs. 33% in 2001). In addition, the number of companies that use video surveillance to track employees’ performance has also increased, with 10% now videotaping selected job functions and 6% videotaping all employees. Among firms that use video surveillance, 85% notify employees. As more and more employee groups become aware of how they are being watched, the more likely they will take their employers to court. These are the four main types of court-upheld privacy violations that could occur in shops, factories and offices and the first type is directly related to video surveillance. Intrusion upon seclusion which includes invading worker privacy in bathrooms and changing rooms; Publication of private employee matters; Disclosure of medical records; Appropriation of an employee’s likeness for commercial purposes. In addition, video surveillance must be limited to visual images and cannot include audio in order to comply with regional and national statutes. Employers need to be proactive and aware of these four privacy violations so that their employees’ individual rights are respected and protected. How to achieve balance between monitoring and intruding upon employees First, the employers need to clarify what privacy rights employees are guaranteed and what constitutes an invasion of privacy. Then, employees must be notified in writing that video surveillance will be conducted and they should also sign a waiver verifying that they know they may be monitored. Management must define what is acceptable supervision versus "snoopervision" and that includes not videotaping showers, toilets, changing rooms, smoking areas, and employee lounges. These are places specifically for employees’ personal comfort, health or for safeguarding their possessions. However, employers must also be sensitive against using video surveillance in other areas where employees might takes breaks. Employers must be fully aware of the privacy risks associated with videotaping employees so that the likelihood of litigation is reduced. Companies should also nurture a workplace environment where employees can voice privacy or security concerns in confidence with management without feeling that their conversations are being monitored. In short, if employers choose to use video surveillance in the workplace, they must adhere to written privacy guidelines that will keep employees secure and that will also respect their privacy.
News

Workers Not Taking Summer Break

New research has shown that 23% of UK workers aren’t going to take a summer holiday this year, despite persistant claims that Britain is an overworked nation with a poor work-life balance. Those who are taking a break during the summer months are very likely to have booked their time off well in advance. A minority of 3% are intending to ask for time off, but might have left it too late for bosses to say yes. This situation may place businesses in a difficult situation. Staff failing to take their holiday entitlement is potentially placing their organisation at risk as overworking themselves into the ground could lead to much more serious health problems and, ironically, enforced time off. A similar survey conducted last winter showed that a third of UK workers fail to take their full entitlement and of these, 7% will lose their holiday altogether, not being able to claim either payment or rollover days into the following year. It was estimated that over £14.5 billion worth of holidays were going unclaimed. In order to ensure that your employees take their annual holiday entitlement, you should set out an annual leave policy following the guidelines below: Outline employees’ annual leave entitlement, which should be at least the statutory minimum of four weeks’ paid leave, as stipulated in the 2000 Working Time Directive; Outline the dates your organisation’s holiday year runs to and from; State that employees should take the leave they are entitled to, outlining the responsibility of managers in ensuring workload demands do not prevent leave from being taken. Cleary state your company’s policy on whether it will allow employees to carry holiday over to the next year or pay for leave not taken. Outline the process for requesting and approval of annual leave; Detail any circumstances in which annual leave may be withdrawn.
News

Home CCTV Surveillance

When you monitor your home or office with CCTV surveillance, it’s like you have an entire television network devoted to the safety of your home. CCTV broadcasts your security surveillance on a private network, but unlike broadcast television, all components within your network are connected through cables and wires. Already popular in large public places where security is heightened, such as at airports or casinos, CCTV systems are becoming more and more widely used in private home settings as well. Many independent studies in the UK have suggested that CCTV surveillance acts as a powerful deterrent, stopping crimes before they happen. Studies also show strong evidence that CCTV can be an extremely effective tool in detection and prosecution. The same CCTV video surveillance technology used in our public venues is available for your home. We offer systems that can monitor every room in your home through dedicated CCTV cameras, which produce clear, high visibility images. One surveillance system can cover up to 16 rooms in your home. By monitoring your family’s security on a CCTV network, you are able to record suspicious activities as they occur. Monitor your garden, front door, garage, even your mailbox. We strongly believe that CCTV security is a powerful addition to your home security system. Your home is your castle, and you have the right to protect it however, CCTV is subject to laws regarding a person’s right to privacy and you want to remain on the right side of the law. Therefore, when installing a CCTV system in your home, it is important that you are certain of the legality of your surveillance. CCTV is inexpensive and simple to use, and it will help increase security and put your mind at ease. For more information on CCTV systems for your home, office, or factory, contact us today.
News

Wary Of Unproven Biometrics

It seems that the unproven nature of biometrics is proving to be a stumbling block for private sector industry, and is the main reason for the slow uptake of biometric security. There have been no extensive trials conducted by companies not involved in the biometrics industry, and so no precedent has been set for the large-scale implementation of biometric technology. The most significant trials conducted with biometric technology have been infrequent and only publicised to select market sectors. This has meant that the UK business community as a whole have been unaware of any trials taking place, let alone being able to view the results. An example of this are the small frequent traveller trials conducted by airlines, but these trials have tended to involve educated, tech-savvy males, which is not a representative sample of the UK population. In addition to low-key device trials, logistical issues around the process of capturing biometrics have proved a stumbling block. Unresolved difficulties with, for example, people with dark eyes or worn fingerprints, are also slowing the progress of widespread implementation. Early adopters of the widespread implementation of biometric systems are expected to be banks and financial services companies, as they strive to protect their customers with the best security available on the market. Suprisingly, it seems that the private sector are leading the way in the utilisation of biometric devices. A growing trend has been experienced in the PC and laptop security sector as individuals strive to safeguard their data. With logon devices costing as little as £40, many people are deciding to bite the bullet and invest in the new technology. With so many different types of biometric device available on the market and no production standards set in stone, all biometric products run the risk of being tainted by the same "biometric technology" brush, something which can only be rectified through well-publicised trials of the technology.
News

Close Up On RAL Colours

The RAL colour collection was first developed in 1927 in Germany by order of the state and industry. RAL was introduced primarily to help development within the lacquer and pigment industries by standardising colour tone. The original 40 colours from 1927 were quickly noted as being insufficient for the diversity of the market, and new colour tones were added to the system – most recently, magenta red and three new shades of grey. Thirty of the forty tones from 1927 are still contained in the RAL colour charts, which are distributed today. Nowadays, there are 194 individual RAL colours each of which has a four-digit designation, in which the first digit specifies the classification of a colour region. Here are some examples of the classic RAL colours: RAL 1003 Signal Yellow RAL 2002 Vermilion RAL 3000 Tomato Red RAL 4010 Telemagenta RAL 5014 Pigeon Blue RAL 6011 Reseda Green RAL 7000 Squirrel Grey RAL 7037 Dusty Grey RAL 8017 Chocolate RAL 9018 Papyrus White Differences in video and printing rendering devices mean that only approximate samples of RAL colours can be reproduced through a computer monitor, therefore you should always refer to an original classic RAL colour card for precise colour reproduction. A number of the physical security products showcased on this website are available in any RAL classic colour as a special order to match your corporate identity. If you require this service, please don’t hesitate to contact us for a low cost quote.
News

Wasted Time At Work

According to a recent survey, the average worker in the UK admits to frittering away 2.09 hours per 8-hour workday, not including lunch and scheduled break-time. As a matter of practice, companies assume a certain amount of wasted time when determining employee pay, however this new survey indicates that employees are wasting about twice as much time as their employers expect. So what is the biggest distraction? Yes, you guessed it: personal internet use. 44.7% of the more than 10,000 people polled cited web surfing as their #1 distraction at work. Socialising with co-workers came in second at 23.4%. Conducting personal business, "chilling out", running errands, and making personal phone calls were the other popular time-wasting activities in the workplace. Employees say they’re not always to blame for this wasted time, however. 33.2% of respondents cited lack of work as their biggest reason for wasting time. 23.4% said they wasted time at work because they feel as if they are underpaid. But, are workers really expected to work 8 hours per day, non-stop? Companies assume that employees will waste 0.94 hours per day. They take this into account when they do their compensation planning. However, those managers privately suspect that employees waste 1.6 hours per day. In fact, employees admit to wasting 2.09 hours per day. To some bosses, that’s a startling figure. Others, though, will view this extra wasted time as so-called ‘creative waste’ – wasted time that may well have a positive impact on the company’s culture, work environment, and even business results. So, who tends to waste the most amount of time at work? Men vs Women: Men and women waste about the same amount of time per day. This, despite the fact that most HR managers surveyed suspected that women wasted more time at work than men. Youngsters vs. Seniors: It seems that the older people are, the less time they waste at work. If you are guilty of wasting a little time at work (and reading this far may indicate that you are) it may be comforting to know that you are not alone. It is nice to see that UK workers aren’t all work-minded 100% of the day, and that their employers are realistic about that too. Some employees even told us other ways they waste their time at work, such as primping in the bathroom mirror and having running races up the staircase with co-workers. One respondent writes, "the hurried walk around the office is not only a great way to look like you are busy, but also a good cardio exercise." Other employees bring Game Boys or needlework to the office. And when all other time-wasting tactics fail, there is always staring blankly at your computer screen or out a window. So, now that you’ve found out that your average co-worker also likes to indulge in some time-out, why not take a few minutes to surf the web or socialise with co-workers. Then, get back to work!
News

Holidaymaker Nabs Burglars

A businessman on holiday in Spain was able to alert police of a raid on his home in the UK because he’d invested in an expensive net-connected digital CCTV system. Engineering boss John Ellison, 52, watched the attack on his Lancaster home unfold on a laptop PC he’d taken on holiday with him to Malaga, Spain. He was automatically notified (via an SMS message) that something was amiss by the £20,000 security system, which features 16 CCTV cameras, after the burglars bludgeoned their way through a conservatory door triggering installed PIR devices when they attempted to enter his £600,000 home. Mr Ellison reacted quickly, and had his fears confirmed as he remotely logged on to his CCTV monitoring system. He watched the raid in mounting anger for the next 40 minutes until police, notified by Mr Ellison that a raid was in progress, nabbed two of three burglars. One of the burglars was caught wearing a Bart Simpson mask and cowering in Mr Ellison’s bathroom. Mr Ellison has estimated that the burglars have cost around £12,000 in damage to his property. "They were armed with bags full of crow bars and other tools. I was livid. I could see them smashing doors and various other things," he said. "But it was wonderful to see them being marched out and their masks being pulled off. The CCTV security system is expensive but worth every penny. The police seemed impressed as I directed the operations from Spain." The two men caught by police raiding Mr Ellison’s home have pleaded guilty to burglary and are due to be sentenced in November. Police are still searching for the third man involved in the raid. By installing a remotely monitored digital CCTV system, you are able to see what’s going on at your property from virtually anywhere in the World. If you are interested in installing a CCTV security system, then why not contact a member of our sales team, who would be happy to guide you in the right direction.
News

Let’s Get Physical

Small businesses have been warned not to lose sight of the physical security of their laptop computers in the rush to safeguard their IT assets from attacks on the network and over the internet. Statistics reveal that 2,000 laptops are stolen every day in Europe and a survey of small and medium sized businesses across Europe by IDC last year found a staggering 94 per cent had suffered from notebooks being stolen. There are a number of products available that can be used to enhance your laptop security, including biometric logon devices and physical locks designed to protect laptops from physical theft. A lot of emphasis has been placed on protecting your network from attacks but very few were taking steps to ensure that laptops could not be stolen, or hacked into following a theft. Many people think that it’s not a big deal to replace a notebook that costs £500, but some statistics suggest the cost of replacing a stolen laptop could be as high as £8,000 when you take into account the value of the data on the machine and the time taken to replace and reconfigure it. A survey conducted last year found 49% of SMEs took longer than two days to replace a stolen laptop and a significant number took more than a week to do so. Often, laptop locks are the first line of defence to stop opportunistic theft of portable computers. This combined with a biometric lock can prevent even the most hardy criminal from targeting your property. With the cost of providing some level of physical protection to your laptop being around the £30 mark, there now seems little reason not to implement some level of external security device to protect your laptop. Under new airport security measures, users may not be allowed to carry their laptops onto the plane. If you have to place your laptop in a suitcase, we recommend that: If you have a security cable, you should anchor it from your laptop lock to an interior strap or handle casing behind the clothing compartment in a wheeled suitcase; If you own a strong notebook case, anchor the security cable to the grip handles; Buy a notebook sleeve to protect your laptop inside your checked luggage; Do not leave your laptop exposed in full view in your car, the airport, or any public space without locking it down to an immovable object; If you have a biometric laptop security device, store it seperately from your laptop.
News

Biometric Truths And Fictions

Biometrics are seductive: you are your key. Your voiceprint unlocks the door of your house. Your retinal scan lets you in the corporate offices. Your thumbprint logs you on to your computer. Unfortunately, the reality of biometrics isn’t that simple. Biometrics are the oldest form of identification. On the telephone, your voice identifies you as the person on the line. On a paper contract, your signature identifies you as the person who signed it. Your photograph identifies you as the person who owns a particular passport. What makes biometrics useful for many of these applications is that they can be stored in a database. Alice’s voice only works as biometric identification on the telephone if you already know who she is; if she is a stranger, it doesn’t help. It’s the same with Alice’s handwriting; you can recognise it only if you already know it. There are many different types of biometrics, including handwriting, voiceprints, and face recognition. There is also hand geometry, fingerprints, retinal scans, DNA, typing patterns, signature geometry, and others. The technologies behind some of them are more reliable than others, and they’ll all improve. "Improve" means two different things: First, it means that the system will not incorrectly identify an impostor as Alice. The whole point of biometrics is to prove that Alice is Alice, so if an impostor can successfully fool the system it isn’t working very well. This is called a false positive. Second, "improve" means that the system will not incorrectly identify Alice as an impostor. Again, the point of the biometric is to prove that Alice is Alice, and if Alice can’t convince the system that she is her then it’s not working very well, either. This is called a false negative. In general, you can tune a biometric system to err on the side of a false positive or a false negative. Biometrics are powerful and useful, but they are not keys. They are useful in situations where there is a trusted path from the reader to the verifier; in those cases all you need is a unique identifier. They are not useful when you need the characteristics of a key: secrecy, randomness, the ability to update or destroy. Biometrics are unique identifiers, but they are not secrets.