SecurityInfoWatch.com Article Provides Recommendations for Cybersecure Specifications
Hikvision Outlines Roles to Avoid Security Breach, Concerns
The SecurityInfoWatch.com (SIW) article, “Tech Trends: The Integrator's Role in Cyber Specification,” covers the importance of well-written specifications that address cybersecurity to reduce security concerns for manufacturers, end users and integrators.
“It is becoming increasingly apparent and accepted that cyber liability can touch everyone in a project – from end-user to designer to supplier to integrator. No longer can security equipment, security, and service providers look away and think that it is not their problem,” said the author, managing director of Security Specifiers Ray Coulombe, in the article.
Coulombe outlines items that should be incorporated into a specification to maximize cybersecurity protection for all parties, which should be reviewed and approved by the client. His extensive list of specification recommendations included the following:
- A comprehensive inventory of assets, including physical devices, software, and external information systems that can be provided to the client.
- Information about equipment and whether it has been third-party tested for vulnerabilities, and to what extent the manufacturer ensures product cybersecurity (i.e. hardening guide), should be disclosed.
- Passwords and login credentials for device security should match a client’s existing protocols.
The author said integrators should ensure they can implement the specification’s cybersecurity requirements, or supplement an existing team with cyber professionals where needed.
Click here to read more cyber specification insights from SIW.
Hikvision’s cybersecurity director, Chuck Davis, outlined tips to reduce security concerns in the blog, “Roles and Responsibilities to Avoid Cybersecurity Breach.” In the article, Davis offers ideas for end users, manufacturers and installers to improve cybersecurity. He recommended that manufacturers should respond to and communicate about vulnerabilities quickly and develop cybersecurity best practices and education.