• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Cybersecurity Is Hot, But Don’t Overlook Physical Security

    November 9, 2016 Alex Woodie

    Cybersecurity played a major role in the run-up to yesterday’s presidential election, as Russian hackers leaked private communications and attempted to influence the outcome of the election. They weren’t successful, largely because elections remain mostly a manual affair in United States. But it did serve as a reminder of the need to protect critical American institutions in both the cyber and physical worlds.

    In a recent report, the Department of Homeland Security identified 16 infrastructure sectors that are vital to the safety, security, and health of the United States and its people. You’ll find sectors you’d expect to find there, such as nuclear power operators, defense contractors, and chemical manufacturers.

    But the DHS also singled out water treatment plants, hospitals, and food manufacturers as potential targets that must be fortified against physical and cyber attacks. In 2013, President Barrack Obama ordered extra resources be spent to build up security around these critical and largely privately owned infrastructure elements.

    Cybercriminals impact our critical infrastructure on a regular basis. Earlier this year, we told you how “hactivists” from the Middle East were able to take control of the AS/400-based supervisory control and data acquisition (SCADA) application of a water district by hacking a Web-based payment system. The criminals were actually able to remotely turn the valves that control the flow of chemicals into the drinking water system for the water district.

    Nobody was hurt in the water district incident, but it did show how vulnerable the U.S.’s critical infrastructure actually is. Whether it’s electrical substations protected with just a padlock or dams secured with a chain link fence, it’s clear that physical security shouldn’t be lost in the scramble to bolster cyber security.

    One IBM i vendor that’s working to improve physical security is CYBRA. The New York company is best known for its MarkMagic barcode software that runs on IBM i, but it’s been spending much of its time recently building its EdgeMagic products for encoding radio frequency identification (RFID) tags.

    Last month CYBRA rolled out its latest RFID product, called Edgefinity IoT. The Java-based product uses RFID technology to track people as they move about a geo-fenced area, while a rules engine generates alerts when specific conditions are met in the real world.

    The product uses a network of RFID tags and antennas to automatically track the location and movement of people within a facility, such as a hotel or a water plant. If somebody who’s been given an Edgefinity badge wanders into an area of the facility where they’re not supposed to be, then it sends an alert to the security officer.

    CYBRA’s Edgefinity IoT uses RFID to monitor the movement of people in facilities.

    The software can also be used to boost worker safety. If the system detects that a worker in a remote facility stops moving, it could indicate that something is wrong. The Edgefinity badges, which are equipped with accelerometers, also have a panic button that the remote worker can press three times to call for help.

    CYBRA’s safety and security solutions architect, Ben Jakubovic, designed Edgefinity to address unmet safety and security needs. “There are so many safety and security issues to which organizations are vulnerable,” he says. “Water treatment plants and other utilities, airports, mining facilities, disaster recovery teams, you name it. Any industry or organization that needs to keep track of the safety of employees and security of their facilities will find Edgefinity IoT. . . useful.”

    CYBRA is selling versions of Edgefinity IoT for specific industries and enterprises such as schools, mining, utilities, hotels, and hospitals. The software can run on any system capable of running Java and the MySQL database.

    The software side of security gets a lot of attention. But it’s clear that physical security shouldn’t be overlooked in the rush to plug security vulnerabilities, in IBM i servers or elsewhere.

    RELATED STORIES

    Verizon Outlines Disturbing AS/400 Breach At Water District

    Keeping Up With Security Threats To IBM i

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    NGS:  FREE Webinar: Preparing, Presenting, & Using Data with NGS-IQ and Microsoft Power BI. Nov 10
    Fresche:  IBM i staffing for all of your IT needs. Request a FREE estimate. 1-800-361-6782
    Chrono-Logic:  Simplify deployment with LANSA-based Change Management and Deployment solutions.

    The New Tech Canoe: Paddle Less, Go Farther IBM Cuts Core And Memory Pricing On Entry Power Iron

    Leave a Reply Cancel reply

Volume 26, Number 49 -- November 9, 2016
THIS ISSUE SPONSORED BY:

New Generation Software
Chrono-Logic
Vision Solutions
HiT Software
Manta Technologies

Table of Contents

  • Is the IBM i Skills Shortage Accelerating Platform Migrations?
  • Iowa MSP Teams with Vision for Hosted HA
  • DSI Tries Virtualized Backup and Recovery for Power Systems
  • How IBM i Fared in Top ERP List
  • Cybersecurity Is Hot, But Don’t Overlook Physical Security

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle