What Integrators Need to Know About the Log4j Vulnerability
January 11, 2022
Cybersecurity: Take Your Seat at the Big Table
September 28, 2021

There’s a big difference between NSCA members and other integrators in the field—and it often comes down to understanding the gravity of cybersecurity controls NSCA members are the cream of the crop—we insist on that. Put simply, we expect NSCA member firms to live up to expectations that many other integrators do not. This is Read the full article…
2020 P2Pv Session: A World of Connected Devices … and Threats It Presents
October 20, 2020

In this 2020 Pivot to Profit Virtual (P2Pv) session, attendees were confronted with the inherent flaws of connected devices, the trust customers put in integrators, and potential vulnerability of critical data. Watch the full session by visiting here 2020 P2Pv Presenters: Rob Simopoulos, Co-Founder of Defendify Siddharth Bose, Attorney at Ice Miller Connected Devices Meet Read the full article…
If You Sell It, You Now Have to Secure It
June 23, 2020

This month, as the 2020 edition of the Construction Specifications Institute’s MasterFormat® rolls out – the specifications-writing standard for North America’s commercial building design and construction projects – a new requirement will come with it: Integrators must now ensure that Division 27 and Division 28 cybersecurity standards are met and included in all projects. Because Read the full article…
Business Continuity and COVID-19 Response: Resources from NSCA Partners
March 26, 2020

Several NSCA Business Accelerators and Member Advisory Councilmembers are turning their attention to business continuity amid the COVID-19 pandemic. We’ve rounded up some of their offerings. There is no silver bullet or playbook for business continuity amid the COVID-19 crisis. To help, NSCA is focused on providing pragmatic business advice with the central goal of Read the full article…
Cyber-Incentives and Legislation: How Tech & Government Can Collaborate to Create a Safer World
July 23, 2019

It’s one thing when ransomware can infiltrate a database and pull sensitive files at will. It’s a totally different predicament when it can seize control of a computer system used to manipulate a company’s machinery. This was exactly the case when LockerGoga, a new breed of ransomware, was used to breach a Norwegian aluminum factory. Read the full article…
Why Systems Integrators Should Offer Cybersecurity Services
June 18, 2019

You’ve heard it before: The integration industry has finally converged with IT. Many security and AV organizations now offer IT products and services in addition to traditional integrated solutions. Providing IT services is a natural fit with many integrator offerings, especially since they commonly work with decision-makers with IT departments. In addition, technicians are becoming Read the full article…
Find Out Whether You Need Cyber Insurance
January 15, 2019

Your integration firm houses all types of personal information: social security numbers, credit card numbers, account numbers, drivers’ license numbers. What happens when this data is compromised? Many people don’t put cybersecurity at the top of their list – but you should. Globally, cybercrime exceeded $600 billion in 2017. The average total cost of a Read the full article…
Business Email Compromise: What to Watch For and How to Avoid It
April 24, 2018

Recently, we’re hearing about more systems integrators being impacted by phishing and social engineering attacks: Non-technical strategies that rely on human interaction and error to break standard security practices so hackers can gain access to your confidential information. Just last week, a member reached out to NSCA about an attack that involved a compromised customer Read the full article…