Ensuring privacy when undertaking surveillance

    Surveillance and privacy are not natural bedfellows. However, given that surveillance can help with public safety and security, its use in public places is becoming more accepted – so long as measures are taken to respect individuals’ privacy. While privacy has always been a priority in the surveillance industry, public awareness of data privacy rights … Continued

      Taking a borderless approach to cybersecurity governance

      Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, against UK businesses alone, malicious attacks increased by nearly 20% in 2020 as bad actors took advantage of vulnerabilities introduced by remote working. Driven by the potential for financial gain or widespread disruption, cybercriminals can be highly motivated adversaries. Fortunately, businesses … Continued

        The multiple benefits of video surveillance in manufacturing

        Manufacturing is a complex business, and manufacturing plants feature a number of areas of potential security risk and health and safety guidelines to adhere to. There are many areas of a manufacturing business where video can play a valuable role: from the car park, to entrances and exits, office areas, delivery and dispatch and, of … Continued

          Video surveillance and the GDPR. What will change?

          At a time when technology, including smart cameras, allows companies to collect much more sensitive information about individuals, more stringent supervision of the protection of personal data is vital. A video recording of an identifiable person naturally forms part of an individual’s personal data. The EU General Data Protection Regulations (GDPR), which came into effect … Continued

            How to maintain cybersecurity across all your devices

            Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of all devices in the system. In this post, we will explore the cybersecurity best practices specific to … Continued