• Introducing Facial Recognition Technology

    Facial recognition is a software based technology, which is capable of identifying or verifying a person by analysing a digital video frame captured by a video surveillance camera.

    Read full article
  • Our Cyber Security Approach

    Following the transition of IP technology and development of risks around this, WOT have invested in hiring a team of computer science graduates into the organisation. These graduates have collectively formed a complete cyber security installation handbook for engineers to follow. These standards have been selected to significantly reduce the immediate threat of cyber security attacks.

    Read full article
  • Dual Factor Authentication

    Within all IT environments, password security is fundamental. However, with the development of dual factor authentication we can now add an additional layer of protection onto our security systems.

    Read full article
  • Development of Cybercrime

    Due to the arrival of new technology and development of network based devices, we are now at a stage where cyber crime has overtaken all other forms of crime in the UK. For many of us, security had previously been regarded as a physical technology such as CCTV and access control, developed in order to keep intruders out, however this has now changed.

    Read full article
  • General Data Protection Regulation

    In this article we shall explore the new regulations that are pertinent to the security industry and the potential ramifications for any non-compliance, in an effort to examine just how serious the consequences can be for those who neglect customer privacy.

    Read full article
  • WOT Fire & Security Group – Addressing the Latest Challenges of the IPV6 Switch Over

    Since the transition of CCTV to high definition IP video surveillance systems, a sufficient networking infrastructure has developed greater importance within our installations. IPv6 deployment over the internet has increased by over 200% since the world IPv6 launch date 5 years ago, breaking all of the barriers and constraints of IPv4 we had become familiar with.

    Read full article