We specialise in advanced time & attendance, access control, and security management systems

News

Getting Back To Business With Biometrics

People and passwords – in the long run, they just don’t work very effectively together. Recently, a network password cracker was run as part of an enterprise security audit to see if employees were adhering to advanced password policies, and guess what… it found that they weren’t. Within 30 seconds, 80 percent of people’s passwords were identified. Immediately, those same employees were asked to create strong passwords that adhered to the security requirements. A few days later, the password cracker was run again: This time, 70 percent were cracked. The difficulty seems to be that employees are unable to maintain strong passwords, and those that did forgot them, so they would have to be reset. The use of biometrics – the mathematical analysis of characteristics such as fingerprints, veins in irises and retinas, and voice patterns – as a way to authenticate users’ identities has been a topic of discussion for years. Early commercial success stories have largely come from applying biometrics to projects with provable returns on investment: time and attendance, password reduction and reset, and physical access control. Tensor have developed a low-cost biometric logon device which provides a competent alternative to reliance on a username and password system. Biometric fingerprint recognition devices can be connected to any PC or laptop, and provide the effective two-factor authentication process that virtually eliminates the possibility of an intruder hacking into your system. The most mature applications of biometric technology are in systems that control physical access to facilities and keep records of time and attendance. Over the last few years Tensor has rolled out fingerprint-based network and systems across the UK. Incorporated into time and attendance, access control and visitor monitoring systems, the combination of biometrics with smart cards has taken the private sector by storm. Even the public sector are getting on the bandwagon – Tensor’s biometric prison visitor monitoring system has received unprecedented demand, and is now approaching 20 installations in prisons across the UK. Fingerprint biometrics are largely used as part of an authentication process for providing personnel and associates with smart cards for physical and network access. With the Enterprise range of products suitable for implementation across multiple sites, Tensor provide a proprietary biometrics system that works over multiple bases. If you are interested in finding out more about Tensor’s biometric product range, don’t hesitate to contact a member of our sales team who will be happy to provide information and advice.
News

NHS Fails To Secure Data On Mobile Devices

A survey into ‘Mobile device usage in the healthcare sector’ carried out by the British Journal of Healthcare Computing & Information Management has revealed that one fifth of the devices used to store data have no security on them at all and a further two fifths have only password-controlled access, which does not guarantee security from hackers. Using basic hacker software downloaded from the Internet it would take a few seconds to bypass a basic password. Just a quarter of respondents used passwords with another form of security, including biometrics, encryption, smart card and two-factor authentication. Respondents included information managers, IT managers, medical professionals and a range of other job titles. Two thirds of the 117 who responded to the survey were in the NHS and a quarter were suppliers to the sector. USB memory sticks/memory cards (76%) were the most popular mobile device to be used to download data in the healthcare sector followed by laptop/tablet PC (69%), PDA/Blackberry (51%), smartphone (9%) and mobile phone (2%). Advances in technology have resulted in the ability to store gigabytes of information not just in these devices but also MP3 music players, cameras, voice recorders etc. The easy availability of tiny, high capacity storage devices such as USB memory sticks and memory cards makes it very easy for a person to carry unnoticed large amounts of data such as patient records or sensitive corporate data. Overall, 42% of respondents owned at least one of the devices they used, but half of the NHS respondents were using their own devices to aid them in their everyday work. The most common type of data stored was personal contact details (80%), while three quarters stored work contact details. Nearly two thirds stored corporate data and an amazing fifth of the healthcare workers who were interviewed held security details – which could include passwords, PIN numbers and bank account details. About half of the medical professionals carried patient records on a mobile device. The majority of medical professionals used a password alone for security. One Doctor commented that his security was okay because he used "the initials of one of his patients as his password". Two-fifths used higher levels of security, but a small number had no security at all. Comments from respondents included a claim that there was minimal chance of loss or theft and a minimal chance of misuse. Another wrote "my patients couldn’t afford to pay for blackmail and they probably wouldn’t care if others knew" [about their medical records]. A couple thought that the risk to security was no worse than having information on paper. Over half expressed anxiety that patient details are being held on mobile devices. The biggest concerns were that if a device is lost or stolen it would breach patient confidentiality (57%) and that the information "could get into the wrong hands and be abused" (50%). This still leaves, however, a large number who didn’t show any concern and thought that security was adequate. The number of devices that have been lost is surprisingly high. A quarter of respondents had lost a device themselves, and a similar number knew of a colleague who had lost one. However, about half found their devices again and none said there were any consequences from the loss. A small number of colleagues, however, were subject to disciplinary action and one, who had lost a PDA belonging to a local authority chief executive had even lost their job. The survey shows that a large number of people are using their own devices for carrying data such as work contacts, corporate data and even medical records, which is a basic failure of security policy. Two thirds of the devices have no or inadequate security and there appears to be a lack of appreciation of the security risks among a large number of users. About 80% said that there was a security policy in their organisation, but the results of the survey show clearly that there is widespread and serious failure in the way that security policies deal with the risks of mobile devices and are enforced. If you are looking to increase the security of your PC or laptop, Tensor supply biometric fingerprint logon devices used in conjunction with a password to safeguard your data.
News

Stand Firm On Working Time Directive

The UK Government is right to stand firm over the UK opt-out from the Working Time Directive, according to the Chartered Institute of Personnel and Development (CIPD). The CIPD commented as reports from Brussels suggested that a deal between the UK and EU on retaining the opt-out was close. CIPD research has shown that the vast majority of long-hours workers choose to do so, and would resent any moves to remove their right to continue doing so. The UK also leads Europe on flexible working, and as a result average working hours in the UK are not high by EU standards. Mike Emmott, CIPD Employee Relations Adviser, said: "Working excessively long hours is not to be encouraged, and can bring problems for employers and employees. But existing protection under the Working Time Directive has removed the vast majority of the element of compulsion in long-hours working. Most people who work long hours genuinely choose to do so." "There is an argument for better enforcement and more awareness raising of existing regulations to tackle the minority of cases where employers are abusing the opt out provisions. The bigger job is educating managers and employees to focus more on work outputs than hours worked, and of the risks to health and business performance of excessively long-hours." There is a myth across parts of Europe that the Anglo-Saxon labour market model leaves workers enslaved, whereas the European social model sets them free. But analysis of the facts shows that there are many areas – flexible working for example – where UK employees get a better deal from our emerging Anglo Social Model. There is much room for improvement in people management in UK firms to boost productivity, for example by reducing absenteeism and increasing effectiveness at work. The CIPD report ‘Calling Time on Working Time?’, surveyed 750 long hours workers who work more than 48 hours. It addresses many of the issues raised by those in Europe who wish to see the UK opt out removed. The survey found: More than three-quarters of long hours workers say that they do so as a result of their own choice. Fewer than a third of employees sign an opt-out clause at the same time as signing their employment contracts. 10% of employees report that long hours working causes damaging physical effects, while 17% cite mental health problems.
News

The Growing Challenge Of Identity Management

Identity management is a security issue which is becoming increasingly challenging as the perimeter of the network crumbles. This is well illustrated by the DTI Information Security Breaches Survey of 2006, which shows that one in five larger businesses had a security breach associated with weaknesses in their identity management, with the number of incidents being less for smaller companies. The survey found that incidents were from staff gaining unauthorised access to data, staff obtaining and misusing confidential information, financial theft or fraud, and impersonation or phishing attacks. While the incidence of fraud was low, the impact was greater than for any other type of security incident. Several small businesses lost between £10,000 and £50,000 as a result of fraud and one large bank lost millions. Identity management has been a problem for many years, but recent changes to the security landscape have made the risks greater. The growth of mobile computing and remote access are important factors. Couple this with the rapid rise of wireless and the growth in access to applications, then you have significantly increased the opportunities for unauthorised access into your network. At the same time, the internal threat of staff gaining access to confidential information remains as high as ever. Alongside this, the range of potential breaches has materially increased with problems such as pharming, phishing, spyware, keyboard logging, war-driving, etc. on the increase. A number of issues arise in this new landscape. How do you ensure that users activate security features when they connect to the Internet? How do you get them to protect confidential information and guard against threats such as spyware? And not least, how do you manage access to their machines by other colleagues, family or friends. This is a challenging picture and the continued reliance on weak single-factor authentication looks increasingly ostrich-like. The DTI 2006 survey found that some 96% of large companies and 93% of all companies are still using single factor authentication to authenticate users. There isn’t a single answer to resolving these problems, but a number of options. There is one thing, however, which is certain – single factor authentication (passwords) is not enough. There are a number of authentication options: single sign-on is a step forward, but requires superior identity management two-factor authentication is much better and involves the user of authentication tokens, biometric devices, etc. three factor authentication is far superior and involves something you know (e.g. password), something you have (e.g. authentication token) and something you use (e.g. device authentication) Article courtesy of Security Park
News

Smart Card Technology

The ID card debate continues to rage with questions over their purpose, necessity and logistics of a nationwide roll-out still to be answered. In the background, a few organisations are starting to invest in increasingly sophisticated identity authentication technology. Banks including LloydsTSB and HSBC are already starting to roll out token-based solutions, which combine the traditional username and password with a one-time code generated by a keyring-style token, in order to combat ID fraud. It is encouraging to see that financial services organisations are starting to move away from purely password-based authentication techniques in a bid to combat sophisticated key-loggers and phishers. However, the benefits of two-factor authentication devices, such as tokens and smart cards, are not confined to banks. Yet take-up amongst other industries has been slower. Smart cards take strong authentication into a new realm, because they are capable of storing so much information on them and have a vast number of uses. One card, issued by an employer, can allow staff access to office buildings as well as the IT network, thereby combining physical and logical security into one device. Multiple applications on the network can be accessed via a single sign-on mechanism, removing the user’s headache of remembering many different passwords and cutting down calls to the IT helpdesk for password resets. What is more, remote users can access the network with the same level of security as office-based workers using the same card. Not only that, smart cards can be used to make a digital signature, which in future could make electronic documents permissible as evidence in a court of law. Tensor have used smart cards within our security systems for a number of years, and represents a prime example of how the technology can be incorporated into a number of applications. From time and attendance solutions, to access control and cashless catering, one smart card is able to perform a variety of individual tasks. As we continue to move rapidly towards a completely digital age with complex regulations to adhere to, being able to prove beyond reasonable doubt that an email or document was sent or received will be a must-have, not just a nice-to-have. Increasingly, private enterprises are working with government bodies to deliver commercial and public services to citizens via smart cards, because they are capable of storing multiple credentials for access to different buildings, systems and accounts. Further development depends on public and private sector investment in new infrastructure, and the most cost-effective approach is to work together in order to develop the technology then use it according to the needs of their individual organisations. The potential benefits of stronger identity authentication technologies to commercial and public sector organisations alike are immense, encompassing increased efficiency, compliance issues and better access to public services for all.
News

Stolen Laptops Providing Gateway To Hackers

Lost or stolen laptops which fall into the wrong hands can be used to launch an attack on the corporate LAN using tools obtained online or from auction websites. In a recent demonstration showing network vulnerability, a sample laptop with commonly used password security was used to carry out a series of hack attacks to show how these mobile devices can act as a gateway to data housed on internal systems. Local user passwords were compromised allowing data residing on the hard drive to be harvested and attacks were launched on the device’s associated network connections. The first step to compromise the laptop entailed hacking the BIOS before the Windows operating system had launched. A BIOS reset connector, typically used by manufacturers to deactivate and reset the laptop BIOS password during repair, can easily be made or purchased from Ebay and allows complete access to data housed on the hard disk. Alternatively, the hacker can remove the hard drive from the laptop entirely and install this in another device without a BIOS password, again allowing access to data on the drive. Compromising Windows passwords was equally as simple. Backtrack, a Linux tool on CD-ROM, was booted on to the device, providing access to the Windows file system before the operating system had even launched. Software hacking programmes such as GetSyskey and Gethashes were downloaded from the internet and used to access the Windows encrypted passwords. In addition, Rainbow Crack, a software tool which creates Rainbow Tables was used to compute the various password hashes used by the LM password algorithm. Using a precomputed table of over 60GB of hashes, the administrator password was cracked in under two minutes. Moreover, encrypted WEP passwords and remote desktop log-in details from the Windows registry file were discerned using password recovery software. Having cracked these passwords, the desktop could be browsed at leisure and files and documents on the laptop could be identified, even those which the user had deleted from the hard drive. Disk Investigator, a downloadable software tool, was used to recover deleted files from the file system, as well as locating deleted files from flash media such as USB pen drives. Finally, a fictitious corporate LAN was broken in to using a remote access client. An installed Cisco VPN client was used, and cached login credentials stored locally in a .pcf file were located, enabling access. Cain and Abel, a tool readily available online, was then used to crack the Cisco VPN encrypted client passwords, decoding these into clear text. Once inside the network, an enumeration attack was carried out to browse named hosts. These PCs and servers, often given away by telltale names ranging from the obvious, such as ‘Payroll’, to old techie favourites such as Star Wars or Lord of the Rings characters, planets or Greek Gods, were easily identified. Having selected a target client, a free, open-source exploit tool called Metasploit, which provides a simple graphical user interface, was then used to gain administrative access. The hacker was now free to export data from the internal host or carry out corporate sabotage or espionage. The risk of attack to the corporate LAN has increased along with the popularity of mobile working and hotdesking. FBI Computer Crime and Security Survey claims around 50 per cent of organisations reported mobile device theft in 2005 and it’s a problem that affects both the private and public sector. Over the last twelve months in the UK 21 laptops have been stolen from Department of Trade and Industry (DTI) buildings and five laptops have been misappropriated from the Office of the Deputy Prime Minister. Any of these devices could have been used to compromise the core networks of business or government using these simple tools and techniques. Here are recommendations to organisations with mobile workers to help combat information theft: At the very least, encrypt your sensitive files with freely available software. Set a BIOS password, even if they can be reset. Don’t allow users to boot from USB keys, floppy disks, CD ROMs or from a network. Use a secure VPN technology. Don’t allow the caching of passwords or user names in RAS clients. Educate your staff. All too often credentials can be found in notepad files on the desktop. Incorporate biometric logon devices. Consider full disk encryption. PIN lock GPRS or 3G SIM cards. Encourage staff to report laptop or mobile device theft immediately on discovery and ensure you have a 24-hour process to enable this. Consider using passwords which use UK-specific character sets, as most RainbowTables currently available are computed from American keyboard codepages. Article courtesy of Security Park
News

New Guides On Vandalism Released

The Home Office has published a series of 5 short practical guides through its crime reduction website, to help businesses and organisations tackle vandalism and criminal damage. Each guide is short and snappy at only 4 pages long, and addresses practical issues, illustrating its points with pen picture case studies. The five guides are: Tackling Vandalism and other Criminal Damage; Tools and Powers for Tackling Criminal Damage; Environmental Approaches to Tackling Vandalism; High Visibility Policing; Tackling Youth Vandalism. And can be found by following this link. Recommended in the literature is the implementation of surveillance systems. Tensor can provide your organisation with state-of-the-art digital CCTV camera and recording systems, which are compliant with UK police requirements. Tensor are also leaders in the provision of access control systems, which prevent unauthorised access to your premises. Suitable for both large and small sites, Tensor can provide a system to suit your needs. If you are interested in learning more about digital CCTV or access control and how it can help you, why not contact Tensor, and we would be happy to provide you with additional information.
News

All Work And No Play For Boozing Brits

Despite a culture of binge drinking and a reputation for drinking European counterparts under the table, British workers play hard and work hard, with 62% refusing to pull a sickie after a night out on the tiles. In fact, just over a third of Brits have ever taken time off work because of a hangover. A recent poll asked, "Have you ever taken a day off because of a hangover?" Out of 3,359 respondents, the votes were as follows: 49% (1619 votes) – No, I always come to work however hungover I am; 24% (814 votes) – Yes, several times; 14% (486 votes) – Yes, but only once; 13% (440 votes) – No, I think my colleagues/boss would find out. Even with such an open attitude towards social drinking, emergence of the "ladette culture" and last year’s change in licensing laws, British workers still take the line that when there’s a job to do, don’t let a hangover get in the way. Chris Evans and Pete Doherty have infamously turned up for work slightly worse for wear. While these levels of excessiveness are not standard behaviour for everyone, in general the majority of Brits choose to work through their hangover rather than to sleep it off. So what’s getting Brits out of bed and into the office? A hard-working ethos and increasingly competitive workplace may be attributable. In addition, more businesses are offering financial incentives to encourage people to turn up for work. The Government has also called on businesses to invest more time and money in preventing ill health at work. The Royal Mail’s much publicised scheme, launched last August, offered staff the chance to win a car if they did not take any sick leave in six months. Attendance levels rose, with the equivalent of 1,000 more staff at work daily. Sick pay currently costs the industry about £32billion a year, with £4billion purely based on absenteeism figures alone. While it is imperative for employers to identify the root cause of staff absenteeism, steps should also be taken to recognise staff with a good attendance record . Top Tips On How To Work Through Your Hangover DO Tackle big tasks and the most important jobs first DO Drink plenty of water DO Keep your head down – work quietly to conserve your energy DO Remember your manners – be polite and courteous, no matter how rough you feel DON’T Wear sunglasses in the office DON’T Boast about your drinking escapades DON’T Fall asleep at your desk DON’T Email the entire company asking for aspirin
News

Protecting Against Terrorism Guidelines Released

The Security Service, in partnership with the Home Office and the Cabinet Office, have updated existing protective security guidance for organisations with a duty of care for others. This guidance, entitled ‘Protecting Against Terrorism’ has been published in response to requests from businesses to have a hard copy version of the guidance on the website. To help you get the gist of the information, Tensor has produced the following top ten protective security points, which summarise the guidance given in the booklet. Whether you are creating, reviewing, or updating your security plans, keep these key points in mind: Carry out a risk assessment to decide on the threats you might be facing and their likelihood. Identify your vulnerabilities If acquiring or extending premises, consider security at the planning stage. It will be cheaper and more effective than adding measures later Make security awareness part of your organisation’s culture and ensure security is represented at a senior level Ensure good basic housekeeping throughout your premises. Keep public areas tidy and well-lit, remove unnecessary furniture and keep garden areas clear Keep access points to a minimum and issue staff and visitors with passes. Where possible, do not allow unauthorised vehicles close to your building Install appropriate physical measures such as locks, alarms, CCTV surveillance and lighting Examine your mail-handling procedures, consider establishing a mailroom away from your main premises When recruiting staff or hiring contractors, check identities and follow up references Consider how best to protect your information and take proper IT security precautions. Examine your methods for disposing of confidential waste Plan and test your business continuity plans, ensuring that you can continue to function without access to your main premises and IT systems. Welcoming the publication of the new guidance, Home Office Minister Hazel Blears said: "Government and business need to work in partnership to ensure that emergencies are avoided, and when they do happen we are well prepared to deal with the consequences. We know that protective security works." "It is important for all businesses and organisations to plan for unforeseen events in order to deter potential attackers and mitigate the effects of attacks when they happen. This includes having an up to date business continuity plan that should ensure that staff are prepared and that the essential functions of business can survive a terrorist incident, natural disaster, or other disruption."
News

Holidays For Pay

The EU has ruled that British workers are no longer allowed to be paid for unused holiday entitlement. European judges said that the so-called "rolled-up holiday pay" system breached the Working Time Directive, which guarantees employees a minimum four weeks’ holiday a year. The issue came to light after a group of British shift workers brought a case to the European Court of Justice in Luxembourg, where they were demanding the right to payment during their holidays instead of notional extra hourly pay. EU rules state that the minimum period of paid annual leave cannot be replaced by an allowance, except where employment is terminated. If the legislation allowed payment for annual holidays to be included in hourly or daily pay rates, then it could potentially lead to situations where minimum holiday was replaced by an allowance in lieu. As annual leave is a key entitlement under the Working Time Directive, this loophole had to be closed. "The entitlement of every worker to paid annual leave is an important principle of community social law from which there can be no derogation," said the judgement." Holiday pay is intended to enable the worker actually to take the leave to which he is entitled."
News

Biometrics Fighting Identity Theft

A new survey has revealed that UK consumers place most confidence in biometric technologies, such as fingerprint recognition, to help combat the rapidly growing identity theft industry, which is now estimated to be costing UK industry £1.7 billion per year. The independent survey asked 1,000 UK households to investigate the incidence of and attitudes towards financial fraud and solutions. The survey revealed that 2 in 3 consumers believe that banks should be turning to biometric technology in order to combat identity theft – a widespread problem which now affects 1 in 4 British adults according to Home Office statistics. Despite token security being presented as an online authentication standard by some industry bodies, 92% of respondents were unfamiliar with the term and unaware of its use as a security measure. Once explained, only 42% of consumers believed that banks should adopt token security to help combat identity theft. In comparison, the majority of respondents (73%) stated that biometric technology would assist banks in the fight against fraud and 48% placed confidence in smart cards. Considering some historical resistance towards biometric technology, the survey demonstrated that consumers offer a high level of support for biometrics, which appears to have cemented it’s position as the preferred security device in the war against identity theft. Tensor have been incorporating biometrics into our time and attendance and access control systems since 2002. The two-factor authentication not only provides the additional security needed to safeguard a system, but also the peace of mind associated with knowing that you are protected against security breaches.
News

UK Companies Turning To Physical Security

According to the results of a survey of IT Directors by Comunica, an IT service provider, the ‘Smart Office’ is becoming a reality. Comunica has found that out of 100 major companies, 64 percent have already adopted or plan to adopt physical security over IP networks in 2006. This will enable companies to monitor and control systems and buildings using card readers, biometrics and other access systems such as CCTV all from a web interface. The financial sector has taken the lead in implementing this technology with 31 percent having implemented it already and a further 38 percent planning to do so in 2006 which will take the total to 69 percent. Manufacturing has been sluggish in taking up this technology with just 9 percent so far, but the signs are very positive for the future, with 43 percent planning to implement physical security in the next twelve months. There are many advantages to controlling physical security over IP, including cost reduction resulting from being able to use one network for all the security systems and devices. Also, control will be improved and simplified by being able to manage all the security devices on a single platform. Tensor have been developing and installing IP-based physical security systems over the last decade, and have a plethora of knowledge and expertise in the industry. Whether it’s access control, digital cctv, or visitor monitoring you’re interested in, Tensor has a solution for you.