Download PDF version Contact company

Confederation of European Security Services, CoESS and Euralarm have published a joint brochure on cyber security. The first copy of the brochure ‘Cyber security - Threat or Opportunity? It’s up to you!’ was launched during the General Assembly of CoESS held on 11 October in Rome.

Cyber security breaks up the borders between product development, design, installation, operational continuity and alarm response. The guidelines highlight that when addressing cyber security, it is important to understand that all steps are inter-related in a security supply chain.

‘Cyber security - Threat or Opportunity? It’s up to you!’

CoESS and Euralarm's brochure covers the complete supply chain for the fire and security market

With CoESS and Euralarm as publishers of the brochure, it covers the complete supply chain for the fire and security market – from manufacturers of products to private security companies and their customers.

The brochure highlights in an understandable language the risks and responsibilities for each stakeholder in the chain and what companies need to do to mitigate these risks – both from a human and technological perspective. Many are not yet aware of the importance of these, sometimes simple, measures for the security and reputation of their business.

Importance of cyber security

Cyber security is a top priority for businesses and governments. Many large, but also small enterprises already have structures and people in place to enhance resilience against the risks of cyber security. But with a rapidly increasing number of devices connected to a network, the cyber security risks are getting bigger.

Taking measures to enhance resilience against cyber-threats is therefore crucial - for business continuity of fire and security companies and their customers; security of data and assets; and both the industry’s and its clients’ reputation.

Cyber security rules and regulations

The brochure informs the reader about cyber security risks and solutions in the different phases

Although most of the products offer tools to provide a level of protection and many companies have internal cyber security rules and procedure in place, the importance of the human factor in achieving and maintaining cyber security is often forgotten. With the joint brochure, CoESS and Euralarm want to create awareness that, with the right security measures, cyber-threats can be mitigated.

The brochure looks at the whole supply chain and gives recommendations on the role of companies, their employees and end-users in carrying out security measures to minimise cyber security risks. This requires an awareness that each part of the chain needs to implement its own measures.

Cyber security risk mitigation

The brochure also highlights what is already being done to mitigate existing risks and what companies can do in order to ensure the integrity of the chain. On a step-by-step basis the brochure informs the reader about cyber security risks and solutions in the different phases.

Download PDF version Download PDF version

In case you missed it

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

ASSA ABLOY's mobile unlocking innovation wins award
ASSA ABLOY's mobile unlocking innovation wins award

ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received t...

Milestone enhances Care Plus with XProtect remote manager
Milestone enhances Care Plus with XProtect remote manager

Milestone Systems, a global provider of open-platform video management software (VMS), announced the release of the R2 2024 update to its XProtect platform.  This release int...

Quick poll
What's the primary benefit of integrating access control with video surveillance?