Recently, there were published reports that a video security company, Verkada, suffered a breach where hackers gained access to live feeds of 150,000 Verkada cameras and other sensitive customer information. We want to assure everyone that the methods used to compromise Verkada’s devices and infrastructure cannot happen to Rhombus Systems.
Rhombus has always maintained a ‘Security First’ approach. Before starting Rhombus Systems, the founding team created Mojave Networks, a cybersecurity company acquired by Sophos. With decades of cybersecurity experience, the Rhombus design and engineering workflows all begin with security. Rhombus does not have any type of super admin or god-mode account that allows access to every customer account. Security and privacy are intrinsic elements of the Rhombus solution and are designed to protect it against the most sophisticated attacks.
Furthermore, it is a core tenet of Rhombus that customers, and only customers, control access to their data. No one at Rhombus Systems has access to any customer video data. There are no ‘backdoors.’ Even when contacting Rhombus Support, customers must intentionally grant access (for a limited amount of time) to Rhombus Support engineers.
Here is an illustration of how customers can securely and with complete transparency, grant, revoke, and monitor Rhombus Support access at all times with the corresponding audit trail.
We realize these types of events can create a lot of uncertainty. The choices made by one company do not reflect the industry best-practices nor are they consistent with the ‘Security First’ approach employed by Rhombus Systems:
All of us at Rhombus Systems understand the trust placed in our products. Our intent with being open and transparent about our security and privacy practices is to demonstrate that your trust in Rhombus is well-founded. If you have any questions regarding how to protect privacy and security, please email us at firstname.lastname@example.org at any time.
Many CJIS-compliant organizations wonder how video surveillance fits into their security policies. Security cameras help criminal justice organizations secure their facilities and protect employees. However, it’s crucial to maintain CJIS compliance to protect Criminal Justice Information (CJI) while using a video security solution. In this article, you’ll learn how to use security cameras in a CJIS-compliant way, and how you can use video surveillance to strengthen overall CJIS compliance throughout your entire organization.
Organizations in every industry use video surveillance to make decisions that affect the safety of their facilities, employees, visitors, and more. If you use IP security cameras for live monitoring, it’s especially important that footage has low latency and it is as accurate and up to date as possible. But what is considered ‘good’ or ‘bad’ latency when it comes to video surveillance? How does being in ‘the cloud’ affect it? This post will explore the differences between low latency, ultra-low latency, and real-time streaming. We’ll talk about what you actually need for your video security system, and how you can achieve ultra-low latency and real-time streaming.
Many HIPAA-compliant organizations wonder how video surveillance fits into their security solution. Security cameras help hospitals, pharmacies, clinics, labs, rehab centers, and other healthcare organizations secure their facilities and protect patients and employees. However, it’s crucial to maintain HIPAA compliance to protect Personal Health Information (PHI) while using a video security solution. In this article, you’ll learn how to use security cameras in a HIPAA-compliant way, and how you can use video surveillance to strengthen overall HIPAA compliance throughout your entire organization.