Author Profile

Paul Konikowski

Paul Konikowski, CTS-D, is an independent freelance consultant who currently designs and coordinates audiovisual installations for military bases. Paul earned his Bachelor of Science in Computer Engineering from the Georgia Institute of Technology (Georgia Tech). He has recently completed Harvard University’s online shortcourse entitled “Cybersecurity: Managing Risk in The Information Age”, and is now pursuing a Master of Science degree in Cybersecurity at Georgia Tech. He can be reached via Twitter at @PKaudiovisual or via email pkav.info@gmail.com.

Have suggestions or something you want to read about? Email Paul at PKonikowski@ehpub.com

Paul's Latest Blog Posts

security integrators, cyber security

Hackathons and Cash for Hackers: What the AV Industry Needs

AV, IoT and automation manufacturers need to better understand zero-day vulnerability. Trade show hackathons and cash for hackers should be seriously considered.

Paul's Latest Posts

Logic Bombs, Audiovisual Control Systems

Danger! Logic Bombs in Audiovisual Control Systems

So-called Logic Bombs haven’t quite found their way into audiovisual control systems yet, but just wait…The unprepared will suffer.

networked AV security

The 3-Tiered Approach to Networked AV Security

How should the industry provide a whole culture of networked AV security? It could start with these three steps, says Paul Konikowski.

USB Killer

Attack of the USB Killers: Coming to Your Clients’ Classrooms

What are USB Killers, and what does their existence say about the security behind your classroom/higher ed tech installations?

security integrators, cyber security

Hackathons and Cash for Hackers: What the AV Industry Needs

AV, IoT and automation manufacturers need to better understand zero-day vulnerability. Trade show hackathons and cash for hackers should be seriously considered.

Secure AV systems, AV clients, cyber security strategy, security breaches, Christie, ISC West 2018, Christie Displays, AV Products, cybersecurity, AMX by Harman AV, DoD

Design Principles for Secure AV Systems

Secure AV systems start with smart design. Here are some standards that’ve been around forever but easily apply to modern audiovisual projects.

AV Installations, cyber attack terms

Identifying Cyber Attacks, Risks, Vulnerabilities in AV Installations

Your AV installations ARE incredibly vulnerable to cyber threats. The first step to understanding that is learning these cyber attack terms.

cyber risk management framework approach

5 Steps to Better Cyber Risk Management

Cyber risk management isn’t a business accessory — now more than ever, your firm needs a comprehensive cyber risk management approach. Here’s how to do it.

data breach, Incident Response Plans

The Best Data Breach Incident Response Plans Require These Steps

Incident Response Plans are the most valuable asset to have in the event of a data breach. Having a good one will earn the trust of clients, too.