Moving Into 2020: Video and IoT Trends

             As 2019 comes to a close and we begin to look forward to the next decade, we can now reflect on the year and the trends that have begun to influence both video surveillance and the physical security industries. December tends to be the start of a lull in business, including for the end user. Many businesses can be reluctant to make new purchases in security, or of any kind at the close of the year, and so those in the security industry also feel this slowdown. Still, this time offers us the chance to look forward and prepare for the coming year and beyond.
Here we will look into the security trends we expect in the near future.
Cybersecurity for IoT
            IoT device security will continue to be a major focus, as it has been throughout 2019. Threat actors will continue to target IoT devices at the enterprise level in order to attack business infrastructure. In fact, more than 30 percent of denial of service attacks are targeting enterprise IoT devices already. Because these threats continue to evolve, the IoT and physical security industries must make an effort to keep up with cybersecurity trends and take measures to implement defenses against these threats. Still, many integrators continue to ignore this aspect of the field simply out of a lack of knowledge and a failure to properly gauge the severity of the threat.
             One of the best solutions here are automated tools, which are more advanced than ever. These tools can seamlessly integrate IoT hardening without  requiring a significant level of cybersecurity knowledge. These tools can give a complete asset inventory, secure those assets, and then insure compliance through ongoing monitoring. Automated tools also offer reports to the end user which can be helpful in filling in security gaps and determining where weaknesses and potential breaches in infrastructure are at. It is critical for the modern integrator to adopt such hardening tools to implement security from the beginning and throughout the life cycle of a system.
Device Monitoring
               With IP cameras and other IoT security devices continuing to proliferate and expected to grow to billions of connected devices with IPv6, the demand for services that can assure and track physical security assets will grow alongside them. These device monitoring services track physical assets, monitor the performance of physical security and help with life-cycle management. Real-time management can be achieved through software platforms offering remote connections. These platforms help security integrators to assure system compliance, increase system up-time and performance, all while lowering the overall cost of maintenance. Such services also offer the benefit of RMR to the integrator through remote monitoring service contracts.
The Cloud
                      Much has been said about cloud computing, and it is perhaps one of the most important pieces of the modern internet, allowing off-site data storage and processing using the resources of cloud service companies rather than requiring traditional on-site server setups. Ease of use, reduction in cost, and the simple fact that cloud computing has been critical for the last several years all lead to the end-user wanting these services.
                      Decision makers want to move hardware off premises and are looking for cloud-based solutions to video, access control, device management and monitoring. This demand will increase with time as the cost of entry goes down and cloud computing becomes the gold standard for IoT security platforms. Access control software will be hosted in the cloud, with the data from IP cameras and other security infrastructure fed into it, processed, and stored.
                     There is the issue of upstream bandwidth limitations for some larger commercial security and surveillance deployments. But with 5G coming in the early 2020s, and storage becoming cheaper every year, this is something that will likely be solved in time. In the very near future however, expect some video storage for larger facilities to remain on-site along hybrid solutions involving the use of the cloud for analytics and event video archiving.
                      Another advantage of the cloud is that it streamlines software updates for applications and firmware. Failure to manually manage such updates has historically been a problem in maintaining a hardened network. The cloud allows both these updates as well as new features to be deployed rapidly and securely, all while reducing the costs for integrators.
                        These are all security themes we can expect to continue to grow into the coming years, and the opportunity to remotely service security systems through improved wireless and cloud infrastructure will be leading the way. We can expect the key security changes of the last 5 years to be predictors, ultimately leading us to an age of extremely fast and hardened wireless security that is fully scalable and as cost efficient for both the end-user and integrator as possible.

STST Inc. is South Texas’ source for professionally designed and integrated security and access control systems.

To set up an appointment to get a quote on your project,

Call us at 210-446-6306
or send an email through our website:

Why Smaller Businesses Can Be More Susceptible to Hacks



The last few years have seen major breaches at sprawling corporations such as Facebook, Yahoo, and Marriott Hotels. The list continues indefinitely, and the total losses amount to many billions.

Between overreaching government surveillance, ISPs monitoring us, and the world of cyber-crime, online privacy continues to shrink. Today’s children will never have known the Internet of the past before the total control of tech monopolies and so-called “bulk” data collection efforts of both domestic and foreign governments. Because many of these tech giants do not adequately protect against hacking efforts, even with their massive budgets, the small to medium business owner might feel that these outcomes are unavoidable, and therefore take no proactive measures against them.

Corporation tend to ignore the signs leading up to a hack even though attacks have been steadily rising through the years. They instead prefer to mop up afterwards, and so have set a trend for poor information security. Still, these megacorporations do possess the resources to strengthen their cybersecurity, and so the online criminal element often decides to target the smaller players.

In fact, many dozens of smaller businesses are targeted each month with the attacks being launched from all over the world, many times from overseas. This is despite some smaller business owner’s argument that their small size alone is enough deterrent. They tend to imagine a hack that pulls off something more extreme, such as a ransom on their networks, but most attacks aim to steal and sell people’s data and identity.

Today’s attacks are carried out with robust yet freely available and highly automated tools such as Metasploit and the Kali Linux operating system. It is often not necessary to have knowledge of programming or the ability to write your own scripts in order to lead an effective attack against a network, and as much as 80 percent of all data breaches are a result of weak password security.

Many people and companies will reuse the same weak passwords across several sites, platforms, and networks. Once one of these is compromised, the rest tend to follow. Passwords can be compromised in any number of ways, with the weakest susceptible to simple brute force attacks or rainbow table attacks against stolen hashes (an encryption technique) of the passwords.

It is not uncommon for CEOs and owners to be unaware of exactly the password policies their management have set. Experts in information security have long emphasized that although these policies must necessarily stem from upper-management, everyone must be on-board and playing their part. Frequently changing passwords and making sure to eliminate permissions for any ex-employees right away is critical, as there are many online grey-markets where sensitive network information can be sold.

A common assumption is that an effective cybersecurity infrastructure is by its nature expensive.  A company does not need thousands in budget to make themselves at least less attractive to criminals however. Keeping online credentials private and not sharing login information between employees goes a long way.

Effective security often operates on a “need-to-know” basis. VPN services are cheap, easy to use, and grant so many benefits that not using one is a mistake. From avoiding ISP throttling and surveillance, thwarting region restrictions, and creating an encryption tunnel between you and the Internet, these services can be invaluable. Certainly you should not connect to a public WiFi without going through your VPN. Finally, many enterprises use password management apps and software, which by default provide security.

Methods for Enhancing Building Access Control

Whether you have a building that has successfully used the same access control protocols for years or one that needs change, this coming quarter of 2019 is a good time to consider reassessing the system and procedures you use. Critically, if you are not using any form of access control, consider adding it as part of your security plan sooner rather than later.

Having a solid access control system and policies in place will help keep your occupants, assets, and property safe by ensuring secure access for the right people to the right segments of your property.

Sitting next to surveillance and maintaining a human presence on-site, a system of electronic access control completes a triad of safety, and will be designed to take into account the design of the building, any complementary security systems, and training for those who will use it. Following are three things to think about when working with a security integrator to design and implement electronic access control on your properties.


1. Setting Access Levels

Borrowing a page from the “Zero-Trust” doctrine of info-sec administrators, it is important to think with the mind of the potential aggressors you are implementing the system to protect yourself against. There will be people who simply do not need access to all levels of a building, and before deciding who should have what level of access, the building itself should be examined to determine points of exposure.

It can be useful to take a map of the structure and break it down into zones of different colors according to the access or security level needed. Then you can decide who can have access and associate time and date restrictions to those identities.

It will generally make sense for the majority of employees to enter and exit through a single point of entry, so as to more easily monitor who is in and out of the building. From there, branch out and look at the rooms inside. Set a protocol in place to make sure everyone has the right level of access for their needs, but nothing more. Modern systems will create a “digital fingerprint” for each person granted access, able to track their movements and any times they accessed specific areas.


2. Audit Access

A common trap to fall into is an over-issuing of key fobs or cards over time. As people report losing cards or forget them, it is often simplest to issue another right then and there. Of course, this creates significant security concerns overtime with duplicate access cards potentially being available for malicious use. To manage this, facility admins must either audit the system regularly or set automatic time-out features to the cards.


These features could include:

-Access denied if the card has not been used within a set amount of time

-Self-expiration of the card

-The direct connection of the card to a database that will be managed personally or by an administrator


In the event that third-party employees require access, a separate database can be created. Using a specific search term for these contractors will differentiate them within the database.


3. Perform Periodic Testing and Protocol Assurance

Just like any other electronic system, regular testing and updating of drivers is necessary. Security flaws are repaired through patches by the vendor, and if you fail to update, the potential for threat actors to take advantage of that failure exists.

Furthermore, without the assurance of procedures and protocols surrounding the use of these systems, their value is greatly reduced. For instance, a simple but popular method of building intrusion called “tailgating” relies upon our social tendency towards politeness over security assurance. In this attack, the threat actor simply follows closely behind someone accessing the building and relies on them holding the door for them.

This is actually one of the most difficult to control threats to an access control system due to its simplicity and zero-tech approach. Having multiple layers of security, man-traps, and other fail-safes massively reduces the success rate of “tailgating”. Protocol should assume anyone who cannot present a card or other provided identifier to be a potential threat.


Security Technology of South Texas is happy to offer
custom access control and surveillance solutions to the
business security market, designed either turn-key and from the ground up,
or integrated into an already existing series of cameras and access control

Please contact us through email at

or by phone at 210-446-4863 24/7 to schedule a consultation.

GV-VD8700 “Face”

The VD8700 8MP face recognition analytic camera, recently released by Geovision, a world leader in surveillance, features on-board analytics as well as a facial recognition program. The device is able to capture faces and store those images to allow it to initiate alerts to the user if a certain person enters its view.

Geovision’s GV-VD8700  is a ‘Vandal Proof’ IP Dome camera featuring industry leading face recognition technology. Unlike some off-the-shelf solutions, this device features not only person/vehicle detection modes with analytics capabilities, but the power to identify personnel from a database. Up to 10,000 face profiles can be defined in the camera’s database. This database can also be categorized to meet various other needs in the corporate environment, including facilitating customer service, security management and more.

This camera’s facial recognition mechanism is effective within a relatively short distance of 4 meters, and is meant to be used in points of entrance to a facility, but it is able to detect up to 10 faces at a time. A recognition time of just 2 seconds allows quick identification of both VIP guests and potential intruders. Integrated with Geovision’s GV-VMS, this IP camera can also be used to trigger alerts based upon predefined rules, providing improved and reliable security management.

In its outdoor version, the camera features IK10 vandal resistance with IP66 ingress protection. In order to  achieve a better compression ratio while still maintaining high-quality imaging at reduced network bandwidths, the camera supports the H.265 video codec. If intended to be used for night operations, this version of the camera is equipped with an IR effective distance of up to 40 meters. Wide Dynamic Range and Backlight Compensation allow the camera to detect faces in environments with drastic light contrast.

It is able to pan, tilt, and rotate on a 3-axis mechanism; pan 0-350 degrees, tilt 0-75, and rotate 0-340 degrees. It runs on Windows 10 and has support for mobile device access for iOS and Android. Storage is at 2GB for RAM, and 8GB for ROM. The camera can run stand-alone or connected to a Video Management Software (VMS).

Facial recognition and analytics gives an existing system a new edge. Large retail chains use this technology to identify shoplifters, capturing their face when they steal the first time, so that security can be alerted immediately to any time that individual returns. It could also be used on a door, front porch, or any place where you might want to know if a specific person is coming to, and if so, whether you would like to receive an immediate alert about it.


To learn more about how facial recognition cameras can help protect your commercial facility, please contact Security Technology of South Texas, Inc. at 210-446-4863 or through the website form: