As a result, only 43% of all state-issued driver\u2019s licenses and identification cards are currently REAL ID-compliant. DHS and various states also need time to implement requirements mandated by the REAL ID Modernisation Act, including changes that will streamline processing by allowing the electronic submission of certain documents.<\/p>\n\n\n\n
www.dhs.gov\/real-id<\/a>.<\/p>\n","post_title":"DHS extends REAL ID full enforcement date","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"dhs-extends-real-id-full-enforcement-date","to_ping":"","pinged":"","post_modified":"2021-04-28 13:01:56","post_modified_gmt":"2021-04-28 12:01:56","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5865","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5576,"post_author":"1","post_date":"2021-04-09 10:43:08","post_date_gmt":"2021-04-09 09:43:08","post_content":"Many would consider breweries as \u201cessential\u201d over the last year, particularly in times of lock down. That\u2019s why when North America's largest beer producer suddenly ceased production last month due to a cyberattack<\/a>, it sent shockwaves through the industry and around the globe. What could make this multi-billion dollar empire grind to a halt? How do other organisations ensure they don\u2019t suffer the same outcome?\n\nFood and beverage companies often run nonstop, with potentially catastrophic effects when the production chain is disrupted. In this particular case, a suspected ransomware attack left the company behind iconic brands like Pilsner, Miller and Grolsch unable to access systems involved in the production and shipments of these popular drinks. Unfortunately, this type of industrial sabotage is becoming more and more common, as selling remote access into organisations is a documented ecosystem approach<\/a> for ransom groups. Furthermore, this type of attack in manufacturing tripled<\/a> in 2020.\n\nThe revenue impact of the sabotage is still being calculated but - as described in the regulatory document<\/a> - the company also expects incremental one-time costs related to consultants, experts and data recovery efforts in both their first and second quarters of 2021.\n\nMolson Coors joins an ever-growing list of high-profile companies hit with a major disruption to its business due to ransomware. The combination of the critical nature of the manufacturing process and potential security vulnerabilities with Operational Technology (OT) or Industrial Control System (ICS) assets, has created the perfect playground for cyber criminals. And while the precise nature of the cyberattack is yet to be disclosed, it\u2019s a lesson to organisations the world over that they need to be strongly positioned to prevent, detect and respond to similar incidents. Some key takeaways from this incident should be:\n\nIT and OT\u2019s inevitable convergence<\/strong>\n\nManufacturing processes around the globe have increasingly been relying on IT and OT technology. But the real game changer is that previously isolated manufacturing networks slowly integrated with IT networks, exposing OT assets and Industrial Control Systems (ICS) to a wider range of threats. Cybercriminals now have an IT and OT backdoor onto the company network.\n\nSecurity that\u2019s purpose-built for manufacturing<\/strong>\n\nHackers look at IT, OT and IoT devices as a single continuous system, and so should organisations. Detecting cyber-attacks cannot be based on traditional security agents only \u2013 or worse \u2013 network-based scans that could take down your OT devices. These types of attacks call for a much different approach \u2013 on that discovers, classifies, and identifies threats for every type of IT, OT and IoT device in the environment; and is non-disruptive with no agents required. Manufactures should also be able to:\n\n-\u00a0 \u00a0 \u00a0 \u00a0Identify vulnerable devices in their environments\n\n-\u00a0 \u00a0 \u00a0 \u00a0Monitor device behaviour to detect compromises or policy violations\n\n-\u00a0 \u00a0 \u00a0 \u00a0Take actions to quarantine suspicious or malicious devices\n\n-\u00a0 \u00a0 \u00a0 \u00a0Stop attacks from moving laterally from device to device\n\nTraditional threat response solutions are blind to unmanaged devices<\/strong>\n\nMolson Coors engaged Forensic IT firms to investigate the exact nature of the incident, in order to properly assess the attack. This is a process where many companies will also turn to traditional Endpoint Detection and Response (EDR) systems, relying on agents. But agents can\u2019t be installed on the vast majority of OT devices in manufacturing environments. Here again, a different approach is needed to continuously monitor the state of each device in the environment and the connections made by each device.\n\nThen, importantly, this information should be recorded and stored in (ideally) a cloud-based system so that, when a security event occurs, security teams can easily scroll back in time to see the scope of the breach, what devices were communicated with, over what protocols, and how much data was transmitted to determine the damage and risk to the business.\n\nArmed with the right information, organisations can learn from the experiences of their peers and make themselves better equipped to identify the root cause of the incident, restore operations and, crucially, take precautionary actions.\n\nwww.armis.com<\/a>","post_title":"Not the beer! Lessons learned from the Molson Coors cyberattack","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"not-the-beer-lessons-learned-from-the-molson-coors-cyberattack","to_ping":"","pinged":"","post_modified":"2021-04-09 10:43:13","post_modified_gmt":"2021-04-09 09:43:13","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5576","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4859,"post_author":"3","post_date":"2021-02-09 07:56:59","post_date_gmt":"2021-02-09 07:56:59","post_content":"Bayshore Networks and GE Digital have expanded their partnership to address the growing need to secure industrial and critical infrastructure networks. GE Digital\u2019s OpShield technology will be integrated into Bayshore Networks\u2019 solutions providing industrial cybersecurity and active prevention\/protection for industrial equipment, including programmable logic controllers (PLCs), human machine interface (HMIs), and engineering workstations.\n\n\u201cWe\u2019re pleased to announce another way we will support organisations who need to protect operational technology (OT) environments, industrial processes, and plant operations,\u201d said Steve Pavlosky, Director, Digital Product Management at GE Digital. \u201cBeing at the heart of an operation\u2019s data visualisation, control and reporting, it is critically important to ensure companies are taking steps to protect this key element to their operations. The combination of Bayshore\u2019s In-depth Policy Engine with GE Digital\u2019s OpShield Management Console and Advanced Protocol technology addresses the fact that while companies may have threat analytics or detection solutions as part of a cyber security triad, they must have advanced prevention capabilities.\u201d\n\nGE Digital began working with Bayshore in 2019 to bring cybersecurity support to GE Proficy installations. With this extended partnership, Bayshore and GE Digital will provide customers in all industries with software that includes Bayshore Networks\u2019 cybersecurity technology with GE Digital\u2019s OpShield capabilities.\n\n\u201cBayshore is tremendously excited to see the relationship with GE Digital expand to combine our joint technologies with the goal of launching OpShield NextGeneration as the premier detection\/active prevention solution for the entire industrial marketplace as we jointly work to secure the world\u2019s industrial and critical infrastructure networks,\u201d added Kevin Senator, CEO of Bayshore Networks. \u201cTogether, we will support existing GE Digital customers as well as new customers with technology to protect their OT endpoints and networks from ever-changing and increasing cyber threats as well as advancing this combined technology to a broad range of control products from a variety of vendors. Bayshore\u2019s advanced technology brings a whole new level of safety and resilience within the reach and control of plant operations everywhere regardless of PLC brand in use.\u201d\n\nThe partnership combines GE Digital\u2019s OpShield security technology with Bayshore\u2019s Deep Content Inspection and Advanced Policy Learning and Enforcement, enabling Bayshore to create an integrated product line, to be called OpShield NextGeneration. Bayshore will be the exclusive provider of this combined technology to customers worldwide through GE Digital, Bayshore, and other sales channels. OpShield NextGeneration can reportedly protect most HMI and supervisory control and data acquisition (SCADA) systems from unauthorised and potentially high-risk or dangerous network activity such as unscheduled configuration changes, unscheduled maintenance events, indicators of reconnaissance and surveillance, Denial of Service (DoS) attacks, network spoofing and piggybacking.\n\n\u201cIndustrial companies will now usually agree that they have hosts and applications which are no longer separated, or \u2018air-gapped\u2019 off for safe, isolated operations from the rest of the company or from outsiders and the internet,\u201d explined Sid Snitkin, Vice President Cybersecurity Advisory Services, ARC Advisory. \u201cThese types of systems are susceptible to certain OT network attacks. And with the influence of the pandemic, the industrial attack surface and the resulting cyber risk just continues to increase.\u201d\n\nwww.bayshorenetworks.com<\/a>","post_title":"Bayshore Networks and GE Digital combine to secure industrial networks","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"bayshore-networks-and-ge-digital-combine-to-secure-industrial-networks","to_ping":"","pinged":"","post_modified":"2021-02-09 07:57:04","post_modified_gmt":"2021-02-09 07:57:04","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4859","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4689,"post_author":"3","post_date":"2021-01-27 16:31:38","post_date_gmt":"2021-01-27 16:31:38","post_content":"Cybersecurity solutions for industrial automation networks specialist, Radiflow, has announced significant growth in revenues and bookings following the launch of new products in 2020 and continued international expansion.\n\n\u201cAlthough last year has been a challenge for many vendors due to the impact of the global pandemic reducing overall IT spending, the OT cybersecurity space has been relatively unaffected and Radiflow has experienced its best year to date,\u201d explained Ilan Barda, CEO of Radiflow. \u201cOur critical national infrastructure (CNI) business continued its consistent growth, but the biggest growth has been within manufacturing \u2013 an area that had traditionally been less active in the cyber security space and has been prompted to strengthen its defences following a number of high-profile breaches during 2019\/20 \u2013 today, nearly one third of our revenues come from manufacturing.\u201d\n\nRadiflow recorded a two times increase in sales during 2020 compared to the previous year and a three times increase in bookings. Regionally, Europe has been the fastest growing sales territory for the company, including new customers in power, oil and gas and manufacturing. In parallel 2020 did also see major deals in North America and Asia Pacific including new US power utilities and national water and transportation operators in APAC. As of December 2020, Radiflow industrial cyber security solutions for critical business operations have been successfully deployed in over 5,000 sites by major utilities and industrial enterprises worldwide.\n\nRadiflow has also grown its team and partner community to meet international expansion. A major highlight is the creation of a new sales team to cover Western Europe led by the appointment of two new directors: Jesper Nilsson, Sales Director, who brings extensive experience in cyber security including his last role in CyberX and Katrin Rabe, Channel Director, who worked in large multi-national industrial automation vendors such as GE.\n\nOn a commercial level, Radiflow expanded its network of partners especially with tier-1 systems integrators that can serve the new tier-1 customers and provide the suite of services around Radiflow products. For example, Radiflow announced a collaboration with Mitsubishi Electric UK to address the needs of IEC62443 cyber security standards in the Critical Infrastructure and Industrial Automation markets. Radiflow will be announcing additional partnerships with global systems integrators during the first half of 2021.\n\nPart of the surge in sales in 2020 and increased pipeline for 2021 is due to the launch of Radiflow Ciara, a new platform offering Cyber Industrial Automated Risk Analysis (Ciara) to deliver emerging best practice around risk modelling and management using the ISA\/IEC 62443 series of standards.\n\nCiara is a fully automated tool for assets data collection, data-driven analysis and transparent risk metrics calculation, including risk scoring per zone and business process based on business impact. The platform uses automatic data-driven algorithms as a response to the growing digitisation of the production floor.\n\n\u201cCiara delivered a number of industry firsts and addressed a significant sector wide need to streamline previously complex and time-consuming risk assessment processes,\u201d said Barda. \u201cIt not only solves an immediate tactical issue, but has also helped us to expand the conversation with our clients to the wider Radiflow portfolio which has led to significant sales growth.\u201d\n\nOn the technology research side, Radiflow has engaged in several joint projects including with the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation to apply advanced machine learning and artificial intelligence to cybersecurity for industrial automation networks. Radiflow was also part of a project with the National Cybersecurity Center of Excellence (NCCoE) around Cybersecurity for Distributed Energy Resources.\n\n\u201cOur goal for 2021 is to capitalise further on the foundation we have built during the previous year,\u201d concluded Barda. \u201cWe have introduced unique technologies combined with a growing partner community and the next phase is to expand our geographic reach to meet the untapped opportunity \u2013 especially in Europe.\u201d\n\nwww.radiflow.com<\/a>","post_title":"Radiflow sees record year for growth and revenues","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"radiflow-sees-record-year-for-growth-and-revenues","to_ping":"","pinged":"","post_modified":"2021-01-27 16:31:41","post_modified_gmt":"2021-01-27 16:31:41","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4689","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4655,"post_author":"3","post_date":"2021-01-24 01:27:00","post_date_gmt":"2021-01-24 01:27:00","post_content":"Industrial Defender has launched an IT-OT integration lab. The lab has been created to accelerate advancements in the industrial control system (ICS) cybersecurity space by providing a real-world setting to experience new technologies virtually.\n\nThis IT-OT Integration Lab will be used to research and develop emerging technologies and test cybersecurity integrations. In addition to this, it will deliver rapid, realistic evaluations of the Automation Systems Manager (ASM) and its partners at what Industrial Defender states will be a lower cost than a traditional proof-of-concept (PoC). Finally, the lab will provide hands-on, virtual experiences for those who want to learn how to apply cybersecurity fundamentals, as well as product training for the ASM.\n\n\u201cBy virtualising cybersecurity technology assessments, the IT-OT Integration Lab will allow our customers and partners to make strategic security decisions faster and at a lower cost,\u201d said Jim Crowley, CEO at Industrial Defender. \u201cOur lab will also support important R&D efforts for both our product team and partners to bring innovative new solutions to market.\u201d\n\n\u201cThe wide variety of IT and OT devices in the integration lab provides us with the real-world environment we need to consistently research, train and test our ML-powered cyber risk modelling algorithms for industrial control systems,\u201d added Jose Seara, CEO at DeNexus. \u201cWe'll continue to work closely with Industrial Defender to deliver on our mission to build the global standard for industrial cyber risk quantification.\u201d\n\nMichael Trautman, CTO & VP CyberSecurity at FoxGuard Solutions noted that: \u201cEvaluating our integration with Industrial Defender in the IT-OT integration lab ensures we are delivering the best vulnerability management solution possible to empower those on the frontlines of industrial control system cybersecurity.\u201d\n\n\u201cWaterfall Security Solutions is pleased to participate in Industrial Defender's IT-OT integration lab,\u201d stated Lior Frenkel, CEO and Co-Founder of Waterfall Security Solutions. \u201cThe lab serves an important role, enabling manufacturing and critical infrastructure enterprises to experience virtually how Waterfall's hardware-enforced solution safely transmits industrial data from control systems to enterprise security teams in a real-world environment.\u201d\n\n\u201cWe are excited to partner with Industrial Defender and contribute to their innovative IT-OT integration lab supporting asset owners and OEMs in the evaluation of new ICS cybersecurity technology,\u201d concluded Eric Byres, P.Eng, ISA Fellow, CEO at aDolus Technology Inc. \u201cThis valuable resource will play an important role in securing the supply chain for critical infrastructure, and we are pleased that the software security risk intelligence aDolus provides will further ensure a more secure supply chain.\u201d\n\nwww.industrialdefender.com<\/a>","post_title":"Industrial Defender creates IT-OT integration lab","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"industrial-defender-creates-it-ot-integration-lab","to_ping":"","pinged":"","post_modified":"2021-01-22 17:29:14","post_modified_gmt":"2021-01-22 17:29:14","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4655","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4479,"post_author":"3","post_date":"2021-01-07 19:16:24","post_date_gmt":"2021-01-07 19:16:24","post_content":"Ditek Networks has launched a new line of Gigabit Power over Ethernet (PoE+) network switches designed for industrial applications. The products in this new line, which includes both 4-port and 8-port models, are built with a metal case and feature a fanless design that reportedly delivers a high PoE power budget. This new line gives IT professionals and security integrators a new choice for powered networks ideal for demanding environments.\n\n\u201cIn sharp contrast to most business and office settings, industrial environments can be a real challenge for network equipment,\u201d said Michael Molinari, Director of Marketing for Ditek. \u201cWe introduced this new line of Gigabit PoE+ Switches to meet these challenges head-on. They have the rugged strength, extreme temperature tolerance, high power output, and quiet, dust-resistant operation that would make them the ideal choice for these demanding applications.\u201d\n\nThe two new models are the DTK-SW4IND 4-Port Gigabit Ethernet PoE+ Industrial Switch and the DTK-SW8IND 8-Port Gigabit Ethernet PoE+ Industrial Switch. Both models support up to 30W of power per port while delivering network speeds of up to 1Gbps. Total PoE Budget for the 4-port model is 120W, and total PoE Budget for the 8-port model is 240W.\n\nThe new switches offer IP40-rated metal cases and a fanless design. They also both have a -40 to 75 degrees Celcius operating temperature range. Both models feature 10\/100\/1000Mbps autosensing ports that automatically detect optimal network speeds as well as two pluggable GBIC module slots (SFP).\n\nThe new models are designed for PoE Network devices, as well as Wireless Access Points and IP Video Cameras. Both models come with an included DIN-rail mounting bracket, and require a separate DC industrial power supply (not included).\n\nwww.diteknetworks.com<\/a>","post_title":"Ditek Networks unveils PoE+ Switches for security integrators","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"ditek-networks-unveils-poe-switches-for-security-integrators","to_ping":"","pinged":"","post_modified":"2021-01-07 19:16:30","post_modified_gmt":"2021-01-07 19:16:30","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4479","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4178,"post_author":"3","post_date":"2020-12-07 14:52:36","post_date_gmt":"2020-12-07 14:52:36","post_content":"Nozomi Networks and Chinook Systems have partnered to provide advanced cybersecurity solutions to protect industrial and critical infrastructure facilities across North America. Under the deal, Chinook will offer Nozomi Networks\u2019 complete portfolio of OT and IoT security solutions.\n\n\u201cFacilities that fully leverage their OT systems deliver tremendous returns when it comes to energy and operational savings, the safety and comfort of occupants and lower total cost of ownership,\u201d said Chinook\u2019s President, Wanda Lenkewich. \u201cAt the same time, the network connectivity that enables these systems, also introduces new and growing cyber threats. Partnering with Nozomi Networks allows Chinook to support clients with an integrated, comprehensive cybersecurity solution that ensures cyber threats are actively discovered, monitored and managed.\u201d\n\n\u201cWe are absolutely delighted to team with Chinook to help industrial and critical infrastructure facilities meet new requirements for secure connectivity across OT, IT and IoT networks,\u201d said Chet Namboodri, Vice President, Worldwide Business Development and Channel Sales at Nozomi. \u201cWe\u2019ve already worked together to deliver on a number of joint customer engagements in both the government and commercial sectors. Partnering with Chinook accelerates our joint efforts to make sure facility-related control and building management systems are safe from cyber threats.\u201d\n\nwww.nozominetworks.com<\/a>\n\nwww.chinooksystems.com<\/a>\n\n ","post_title":"Nozomi Networks and Chinook Systems partner for OT and IoT security solutions","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"nozomi-networks-and-chinook-systems-partner-for-ot-and-iot-security-solutions","to_ping":"","pinged":"","post_modified":"2020-12-07 14:52:40","post_modified_gmt":"2020-12-07 14:52:40","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4178","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":4102,"post_author":"3","post_date":"2020-11-30 17:30:23","post_date_gmt":"2020-11-30 17:30:23","post_content":"Radiflow and Mitsubishi Electric UK are collaborating to address the needs of IEC62443 cyber security standards in the Critical Infrastructure and Industrial Automation markets. The companys believe that the combination of the automation knowledge and tools of Mitsubishi Electric UK with the cyber security and IEC 62443 compliance skills of Radiflow will provide a holistic view of a client\u2019s risk posture.\n\nRadiflow will also provide Mitsubishi Electric UK customers with a consultancy service for cyber security, which includes the provision of OT security risk assessments, provision of Radiflow intrusion detection software and general advice on alignment with IEC 62443-3. In addition, the solution is intended to help customers to support asset owners in satisfying the requirements of the NIS Directive along with due diligence in alignment with CPNI (Centre for the Protection of National Infrastructure) best practice.\n\n\u201cOur new collaboration with Radiflow provides expertise in the field of OT cyber security which compliments and broadens the services that we offer our customers through the Mitsubishi Electric UK System Service Operation,\u201d said David Bean, Solutions Manager for Mitsubishi Electric UK. \u201cThere is a growing demand for solutions that address the requirements of cyber security in the OT space and we are looking forward to delivering those solutions and building our relationship further with the team at Radiflow.\u201d\n\n\u201cRadiflow sees huge value for OT organisations to have cyber security services and solutions aligned with their automation systems,\u201d added Ilan Barda, Founder and CEO of Radiflow. \u201cBy combining the automation knowledge and tools of Mitsubishi with the OT cyber security skills and tools of Radiflow, we are able to provide a holistic view of an organisation\u2019s OT risk posture.\u201d\n\nwww.radiflow.com<\/a>","post_title":"Radiflow and Mitsubishi Electric UK collaborate on cyber security standards","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"radiflow-and-mitsubishi-electric-uk-collaborate-on-cyber-security-standards","to_ping":"","pinged":"","post_modified":"2020-11-30 17:30:25","post_modified_gmt":"2020-11-30 17:30:25","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=4102","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3754,"post_author":"3","post_date":"2020-10-28 17:31:10","post_date_gmt":"2020-10-28 17:31:10","post_content":"PatriotOne is offering a quick tour of the ongoing production facility for its new PATSCAN MSG concealed weapon detection sensor, which is part of the overall PATSCAN Multi-Sensor Threat Detection Platform.","post_title":"Touring PatriotOne's production facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"touring-patriotones-production-facility","to_ping":"","pinged":"","post_modified":"2020-10-28 17:31:15","post_modified_gmt":"2020-10-28 17:31:15","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3754","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3345,"post_author":"3","post_date":"2020-10-16 16:51:29","post_date_gmt":"2020-10-16 15:51:29","post_content":"Dallmeier is highlighting the benefits of its 360\u00b0 all-round video view for logistics and manufacturing centres.","post_title":"Dallmeier reinvents all-round video view for halls and outdoor areas","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"dallmeier-reinvents-all-round-video-view-for-halls-and-outdoor-areas","to_ping":"","pinged":"","post_modified":"2020-10-16 16:51:30","post_modified_gmt":"2020-10-16 15:51:30","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3345","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3232,"post_author":"3","post_date":"2020-10-16 15:21:24","post_date_gmt":"2020-10-16 14:21:24","post_content":"After several outbuildings had been broken into and emptied, an industrial organisation installed a Pyronix security system to deter thieves. The system was called into action when the property was targeted again, and worked perfectly to help catch the perpetrators.<\/span>","post_title":"Pyronix system delivers for industrial property","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"pyronix-system-delivers-for-industrial-property","to_ping":"","pinged":"","post_modified":"2020-10-16 16:22:22","post_modified_gmt":"2020-10-16 15:22:22","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3232","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};