Eagle Eye Networks

Tag: Cybersecurity

Get the latest news and updates on cybersecurity and best practices from the experts at Eagle Eye Networks.

Everything You Need to Know About 5G, But Were Afraid to Ask

5G is coming. Will you be ready? To help prepare you, we recently sat down with our resident expert, Managing Director of Eagle Eye Networks Europe/Middle East/Africa/India (EMEAI) operations, Rishi Lodhia, who shares his vision of 5G and what it will mean to business, and more specifically, the video surveillance industry.  What is 5G? Lodhia: 5G is the fifth and next generation of mobile communication technology. Experts say the fastest 5G networks will be at

Read More ยป

Four Ways to Protect Your Business from Cyberattacks

By Hans Kahler, VP of Operations When infamous American bank robber Willie Sutton was asked why he robbed banks, he supposedly replied, “Because that’s where the money is.” Fast forward about seven decades to today, and you might say the same for cyber criminals … they commit cyberattacks because that’s where the money is. But that wasn’t always the case. When we first started unmasking cybercriminals, their primary motivations were exacting revenge for some real

Read More ยป

Deploy Smart City Technology for a Smarter, Safer, More Connected Tomorrow

What makes a city smart? “Generally, it requires intelligent IoT solutions that optimize infrastructure and government to better engage citizens in the management of services,” according to John Kosowatz, senior editor for the American Society of Mechanical Engineers (ASME).  The ASME names its “Top 10 Growing Smart Cities” annually, measuring things like how residents move through and around cities, and how cities provide energy, water, sanitation, and other basic needs. This year, two American cities

Read More ยป
Cannabis video surveillance systems

Secure Your Cannabis Operation from Seed to Sale

With more and more states legalizing cannabis – both for medical and recreational purposes – more and more investors are taking notice – pouring billions of dollars into the U.S. marijuana industry. Profits from the growth and sale of cannabis are estimated to reach $77 million by 2022.    Whether it’s a small mom-and-pop operation or a major investment company, there’s tremendous competition – from cultivation facilities to dispensaries – and they all have an inherent

Read More ยป
The Dangers of Connecting Cameras Directly to the Internet

The Dangers of Connecting Cameras Directly to the Internet

Dean Drako Dean Drako is the founder and CEO of Eagle Eye Networks, the global leader in cloud video security. Eagle Eye Networks ranked #133 in Deloitte’s 2019 Technology Fast 500 list of the fastest-growing technology companies in North America. Before Eagle Eye Networks, Dean was a founder of Barracuda Networks, serving as president and CEO from inception in 2003 through 2012. We have all seen articles written about baby cameras or security cameras being

Read More ยป

Macy’s Hit in Cyber Data Breach

Macy’s and Bloomingdales join a long list of retailers hit with cyber breaches this year, including Adidas, Under Armour, Forever21, Saks Fifth Avenue and Lord & Taylor. In a notice sent to affected customers, Macy’s said it first detected suspicious login activity from certain Macys.com accounts on June 11, 2018: Here are the details of the information captured by the hackers in this breach: Full Name Address Phone Number Email Address Date of Birth Debit

Read More ยป

New Gmail Feature = Phishing Risks

Google is rolling out a redesign of its Gmail service, but federal cyber security authorities are voicing concerns over one particular new feature. This feature is called, “Confidential Email.” Confidential Email gives recipients access to content via a link and is designed to allow users to prevent the forwarding, copying, downloading or printing of emails. The sender actually sets an expiration date so the email is no longer accessible after that specified date. The Department

Read More ยป

Beware of Phishing Emails

Phishing emails are on the rise and can have devastating results, including unauthorized purchases, the stealing of funds, or identify theft. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing

Read More ยป

Canon Cameras Hacked in Japan

Today, the Japan Times reported that dozens of networked Canon surveillance cameras throughout Japan had been hacked. Limited information is available, but it appears surveillance for nursing homes to waterways and other public areas were completely taken offline by the hackers and the cameras were rendered useless. When installing camera systems it is crucial to: 1) Not put the cameras on a publicly accessible network that hackers can get access to 2) Change the default

Read More ยป

Windows Patching

Windows recently rushed out security patches to fix their operating system, creating even more headaches for their customers. It’s no wonder most customers are switching to cloud-based services where they don’t have to worry about these issues. Anyone running a video management system (VMS) on Windows Server @008 R2 or Windows 7 needs to apply these patches quickly. This is a security vulnerability large enough to drive a Boeing 747 through. Literally every and any

Read More ยป