Page 62 - Security Today, November/December 2018
P. 62

Blurring the Lines
Networks, departments and the line between physical and cybersecurity
BTy Peter Boriskin
hanks to wireless lock technologies, cloud-based soft- ware, and smartphone/tablet integration, it is now pos- sible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure. With these advancements and
the continued overall reduction in device costs as performance in- creases, we are seeing a sharp upsurge in the deployment of “smart” locks and integrated/networked access control and security systems.
From private homes and multi-family environments, to public fa- cilities and agencies of all types, customers are recognizing the value of enhanced security, control, and detailed information possible with today’s access control and security systems—but if not properly “hardened” and designed with physical and cybersecurity best prac- tices in mind—there is also great risk.
These new solutions reach far beyond door openings. Server cabinets, lockers, traditional cabinets, and other high-density lock applications represent tremendous opportunities and provide a path for security professionals to increase business and deliver a compelling new service for customers if designed with protection foremost in mind.
Here are a few topics we expect to dominate the security integra- tion discussion in 2019.
46
NOVEMBER/DECEMBER | SECURITY TODAY
It is All Just Security
Documents, assets and information, are often discussed as an ele- ment separate from cybersecurity. While these functions have been managed separately, in today’s highly networked and integrated envi- ronment, this is no longer tenable.
There is a long list of physical items containing data that must be protected—even if the data is offline. In just the last few years, the Department of Health and Human Services’ Office for Civil Rights has settled with a number of organizations that failed to secure or protect physical devices. These cases highlight the need for not only better encryption policies but stronger physical security mechanisms.
Many industries have figured out that physical and information security are no longer two separate functions—physical security and cybersecurity can and should support each other. Cyber risks can rapidly compromise a facility’s physical security. When internal systems are shut down by a cyber attack, it jeopardizes the facility’s entire security profile.
If left unprotected, a range of background systems can inadver- tently provide access to the larger network—water purity systems, fire controls, lighting and HVAC systems—even well-hardened security systems may have cameras or lock systems that can provide malicious access. Interruption to power systems can be devastating. At this level
GROWTH AND TRENDS
sdecore/Shutterstock.com


































































































   60   61   62   63   64