Page 51 - Security Today, July/August 2019
P. 51

a network port to create a backdoor network entrance they can use whenever they want, or pop a flash drive into a computer to download files and folders containing sensitive financial informa- tion—or to upload malware.
This vulnerability at the entrance can be a tremendous weak- ness, and one that is too easily overlooked when planning for optimal cybersecurity. As long as there is the possibility of an unauthorized person entering the premises, you are at a much higher risk for a cybersecurity breach.
Because building and perimeter entrances are key points for physical security, much of the technology for physical security devices has been developed to protect entrances. Even as new technologies have emerged, they have mostly been a variety of protections for standard swinging doors, which have long been used to enter and exit buildings. The use of doors has typically and traditionally been an architectural decision, with door styles selected for their design aesthetic or user convenience with little consideration for security.
Generally, the biggest security concern considered when in- stalling an entrance was compliance with fire codes and other emergency exit guidelines. While it is still important to consider these factors, it has now become necessary to consider the en- trance as a primary factor in cybersecurity best practices.
Installing standard swing doors at any location in a facility presents risk, as their design does not prevent unauthorized in- trusions. Once a swing door is open, even if it has been unlocked using authorized credentials, an unlimited number of people can enter. What is often considered basic politeness—holding the door for the person behind you—can in fact be an enormous se- curity risk. Unless there is a guard at the door, there is no preven- tion for tailgating (additional people following someone through the door). Worse, unless it has special alarms, a door can be propped open and left that way indefinitely.
Even the presence of trained security officers is no guarantee of keeping cybercriminals out of your facility. For them, it can even become something of a sport to get past guards—in fact, there is even a name for this: social engineering. You can read vir- tually unlimited articles and blogs about this online. Many hack- ers openly discuss the tactics they use to get through even the most stringent officer-manned entrances, and tell stories about some of their biggest achievements. Fortunately, most of the ex- ploits that are being written about were done in the name of pen- etration testing, which looks for an organization’s vulnerabilities so that they can address them—but the ease with which they are able to enter secure facilities shows that this is almost certainly happening, unsanctioned, on a regular basis.
Once a cybercriminal is inside your facility, you have lost most of the battle to protect your data. At that point it is quick and simple for them to plug into an IP port, access your network, and perform whatever actions they want. If they walk in and out without having been noticed, you may not even know that there has been a breach until data turns up corrupted, operations cease to function properly, or the stolen data is utilized or ransomed back to you—at which point the damages only multiply.
Security entrances offer a unique level of protection as they not only fully prevent tailgating, one of the greatest risks pre- sented by standard swing doors, but also verify the identity of every individual entering a facility. They cannot be compromised in the way that a security guard can through social engineering, and they cannot be fooled or tricked. When integrated with ac- cess control systems, they reliably deter and detect unauthorized entry attempts. Certain types can even prevent unauthorized en- try without supervision. And, they also enable accurate monitor- ing of who is in the building at all times.
Security entrances work well both against lone actors and organized hacker groups. They enable access to authorized indi- viduals who need to be in your facility while keeping unwanted visitors, including those who are intent to steal your data, out of your facility.
Security entrances come in a wide range of assurance levels, as well. For example, they can take the form of waist high turnstiles for controlling high volumes of traffic, to full height turnstiles, to optical turnstiles, to security revolving doors and mantrap portals that make it close to impossible to tailgate into your facility, with sensors that recognize shapes, size and volume and stop entry.
One additional point must be made about the vulnerabilities presented to cybercriminals at the entrance. Today, any device on the IoT—from a smart fish tank to an elevator system—could be used by hackers as an entry point to the network. The same is true for physical security products from surveillance cameras to Wi-Fi locks. The moment a device is connected to the network, it becomes a potential attack surface for a hacker to use to reach the network, from which they can implant malware, steal data or cause many other sorts of mayhem that disrupts business opera- tions. Every IoT-connected device used in your organization must be properly hardened to prevent this from happening.
For that reason, it is important to take all possible measures to harden your networked security entrances against hacking. There are several protocols you can easily implement to accomplish this.
1. Performing third-party penetration testing is essential across your digital networks, and security entrances should be included in the process. It’s recommended that this testing be conducted on a regular basis, as hackers are constantly updating their tactics.
2. Lock down the control panel to authorized users only, and lock it away entirely at the end of the day so that it is out of the hands of anyone looking to get inside.
3. Make sure that physical and cybersecurity personnel are in communication and agreement as to both physical security pro- tocols and cyber security updates.
4. Limit the number of users that have access to the security system, including entrance operation.
The boundaries between physical security and cybersecurity are disappearing, as each is an essential component of the other. Savvy cyber criminals often attempt to gain entrance into a facil- ity in order to access data, steal intellectual property and other- wise cause harm to an organization. The risks and liabilities can be catastrophic—so it is important to ensure you are as prepared as possible.
Greg Schreiber is the senior vice president of sales at Boon Edam. WWW.SECURITYTODAY.COM NS5
The bottom line is simple: to keep your data safe, you need to address physical security and you must have a fully secure entry.


































































































   49   50   51   52   53