Allen County Law Enforcement Center Case Study – Security Solutions for County Jails

Allen County Law Enforcement Center was securing their facility with 16 year old systems that were no longer supported by the manufacturers. We fixed that.

Connecting five buildings with line-of-sight radios. Who Needs Wires?

By Ryan Kaullen, Field Services Manager at Kenton Brothers

At Kenton Brothers, we get many types of requests for different scenarios and applications. We recently received a request from a customer in the Westport area of Kansas City, MO. The wanted to install video cameras at five separate buildings. And they wanted all of those video feeds to go into a video management system at one of the five locations. This can be a fairly challenging technical request. Our solution was to use Ubiquiti line-of-sight radios to communicate between the buildings. That way, we could stream the camera feeds to the centrally located recording server because they would all be on the same network.

The Ubiquiti radios are mounted on the roofs of the buildings and aimed at the main building where the recording service is housed. (All camera systems have to have a network path back to where the video is recorded.) When you’re physically located in a single building, this is a relatively easy task. In situations where there are two buildings, fiber is often in place between the buildings making a single network possible.

Kenton Brothers: Who Needs Wires? Connecting Buildings with Line of Sight Ubiquiti Radios

Fiber connections weren’t an option between all five buildings, so wireless became the solution.

 

The picture above shows one of the Ubiquiti radios. As you can see, the buildings are several blocks apart. This physical challenge made a wireless connection the ideal solution. And at the same time, it’s the most cost effective for the customer while meeting their business needs and plans for future growth.

In the past, high speed wireless systems used to be expensive, unstable, and slow. New technology like Ubiquiti’s line of products has lowered the cost, improved the stability dramatically and allows dozens of cameras to be streamed at the same time. This technology has allowed customers to cover areas of their business with commercial video surveillance that wouldn’t have been an option financially a few years ago.

Kenton Brothers has deployed dozens of wireless commercial video surveillance systems over the past 7+ years. These have been successful projects resulting in happy customers. Why? Because we’re fixing pain points in their business and making them more secure.

At Kenton Brothers, it is our mission to Protect People, Property, & Possessions. Would you like to learn more about commercial video surveillance? Give us a call!

 

Kenton Brothers: Who Needs Wires? Connecting Buildings with Line of Sight Ubiquiti Radios

COVID-19 Fighter Security Solutions – Avigilon Mask Detection

Avigilon’s face mask detection technology can determine if a person appears on camera without face protection… and alert your team.

Strong Passwords and Multi-Factor Authentication are no joke.

By Neal Bellamy, IT Director at Kenton Brothers

If you’ve been following us for any length of time, you know that Kenton Brothers is all about your physical security. Today, I’d like to talk a little about a different kind of security… your digital security.

Strong Passwords

Over the past decade you should have got the message to use strong passwords. (Probably too many reminders… but are you still using the same, easy to remember password for all your accounts?)

Passwords like “JackAndJill” and “123456” are fairly easy to hack with brute force methods. Also, as more and more data breaches occur, hackers gets access to lists of usernames and passwords. So even if you did come up with the “un-hackable” password and it got leaked, it’s now compromised.

Is your password on a list somewhere?

Kenton Brothers: Strong Passwords and Multi-Factor AuthenticationDid you know there is a website that can show you how many times your password has been recorded in data breaches? The website is haveibeenpwned.com. You can go there to see if your email or password has shown up on hacked lists. By the way, there is no such thing as an unhackable password. Given enough time, with enough resources, any password can be cracked. It seems pretty dire, doesn’t it? However, there are even better ways to protect yourself.

Passphrases

One way to help protect yourself is to use stronger passwords. Better yet, use passphrases. A passphrase is generally longer than a password, which makes it harder to guess, but easier for you to remember. Think of phrases that you use around your family and work-family and use those phrases as passwords.

For example, my family is pretty sarcastic. So when talking to my daughters about getting asked out on a date, my suggested response for them is “HaHaHaYouInsignificantFool”. Throw in a couple of numbers and special characters and you’ve got an easy to remember, secure password. Just remember… not only is it important to have strong passwords, but you’ve got to change them somewhat frequently.

Password Managers: A Unique Password for Every Website

Another way to protect yourself is to use a unique password for each system or website that you use. Unfortunately, this strategy is harder to implement than it seems. I probably have 100+ unique systems and websites that I would need to remember the unique password for. My brain just doesn’t have that kind of storage. That’s where password managers come into play.

A password manager can remember the passwords for you. You just have to remember the master password for the password manager software. There are lots of options out there. Just Google “password manager” to get started. Some of the most common are LastPass, Roboform and Dashlane.

Password managers can be a little cumbersome, like when I’m browsing from my phone rather than my laptop. However, for important accounts with stored credit cards or other personal information, it’s worth the minor inconvenience.

So far, we have just been talking about passwords. An inherent weakness of a password, besides a weak password, is that they’re a single “key” you need to know to gain access to an account. Even better than a strong, unique password is to pair that password with another form of authentication.

Multi-Factor Authentication (MFA)

Kenton Brothers: Strong Passwords and Multi-Factor AuthenticationA lot of websites, including Facebook, Google, and Office365, allow Multi-Factor Authentication (MFA). Multi-Factor Authentication makes sure you are who you say you are by asking for an additional “key” in tandem with your password. MFA can be PIN texted to your phone, an app on your phone that has a PIN that changes every 30 seconds, or a notification on your phone that verifies asks you to confirm you’re trying to log into your account. MFA is easier to use, easier to set up, and more secure than a solitary password.

MFA can be required every time you log in, or only when you’re logging in from a new device. When you log into a site or service, you’re asked for your username and password, but then you’re asked for your second form of authentication. After your MFA is confirmed, you can use the site or service as normal. Since your phone is often the method that your MFA uses, a hacker would need to have your password and your phone to gain access to your account.

Next time you’re given the chance to provide your cell phone number for Multi-Factor Authentication, I recommend you do so! It’s easy to set up and easier to use than a password manager. It’s also more secure than using just a password. For a website that has personal information, but doesn’t have MFA, please make sure your password is unique and strong! This will go a long way towards avoiding the pain of identity theft or other challenging situations if someone were to get into your account.

Access Control Tech Update: Identifying Exposure Through Contact Tracing

Contact Tracing is the process of identifying people who may have come into contact with an infected person, and collection of information about these contacts.