Cyberspace: Custom Privacy: Priority No. 1
I was talking to an integrator at CEDIA EXPO, and he said something other integrators have said, “I only install the control system and A/V gear, not the network. Why should I care about security?”
You should care because your people are using the network to access your A/V gear and if you’re subbing out the network, you’re still accountable in the client’s eyes. I’ve written about several network security issues—using strong passwords, access accountability, the importance of SSL, etc., all in an attempt to further the awareness within our industry of the importance of getting out in front of network security and the intgrator’s role in this process. If you are not positioning your company to incorporate security processes that help protect client privacy, you stand to lose a tremendous competitive advantage.
In the recently released Consumer Electronics Association publication, “Five Technology Trends to Watch,” the No. 1 trend is “Selling the stories of our lives: Technology and Privacy.” You should definitely read this informative article. Here’s why. There is a disconnect in our industry when it comes to understanding one of our customers’ primary concerns—privacy.
Privacy not only as it relates to social networking and personal information, but also privacy as it relates to individual products that connect to the Internet. All of this directly relates to integration companies—how can the home network and its security impact client privacy? Let me answer this by sharing two examples.
No. 1 – Why the technology in your new TV might be more dangerous than you think.
As more equipment is designed with Internet connectivity, there is a corresponding need to add useful Internet-enabled features to these devices. Manufacturers are essentially placing small computer systems inside of their products. Many modern electronics actually run an OS (operating system, most times a variant of Linux). However, along with the new technological possibilities these products offer, there also are new vulnerabilities to their privacy.