14 Aug 2025

Physical security and cybersecurity are deeply intertwined in today’s systems. A weakness in one realm can quickly lead to a breach in the other, and vice versa. However, given the symbiotic relationship, why do physical security systems so often fall short when it comes to cybersecurity protection? We asked our Expert Panel Roundtable: Why does cybersecurity continue to be a weak link for physical security systems?


Will Knehr i-PRO

Cybersecurity remains a weak link because physical security gear is often deployed without best cybersecurity practices and then mounted, tested, and quickly forgotten. Critical security updates are rarely applied during the product lifecycle. Projects are judged on picture quality and uptime, so installers leave default passwords, open ports, and flat networks in place to meet schedules and budgets. Responsibility is splintered: Facilities own the devices, IT owns the switches, and the vendor owns the firmware, so no one owns patching or certificate renewals. Integrators rarely get paid to come back and harden gear, and busy security teams often underestimate the value of the video and access data flowing through these boxes. All the while, the devices sit deep inside trusted networks and make perfect launch pads for an attacker. Fixing the problem means treating cameras like any other endpoint, with secure defaults, easy fleetwide updates, and joint IT/physical security governance.

Mathieu Chevalier Genetec, Inc.

Cybersecurity is still a weak spot in physical security for a few key reasons. Many systems in use today are built on technology with outdated cybersecurity measures. Physical security equipment tends to last 10 to 20 years, and much of it was originally set up with insecure protocols, default passwords, and little to no encryption. That legacy creates a long-tail risk. There is also the issue of ownership. Physical security is often managed separately from IT, so updates and patches may not receive the same urgency or oversight. Some vendors are also slow to release patches or do not clearly communicate vulnerabilities and security updates. As systems become more integrated, complexity and security risks increase. These systems also need to run continuously, leaving little room for downtime. Cybersecurity must be a priority and a shared responsibility among the manufacturer, integrator, and end user to mitigate risks and ensure systems remain secure.

Jaroslav Barton HID

Despite significant advancements in access control technologies, cybersecurity remains a persistent vulnerability within physical security systems. This weakness stems not only from the evolving sophistication of cyber-threats but also from outdated mindsets and siloed organisational structures. Many organisations still approach physical security through a lens shaped decades ago - when systems using RFID cards with no encryption were sufficient. While these solutions may have functioned well in the past, the landscape has radically changed. Today, hacking tools capable of copying or cloning access credentials are widely accessible and inexpensive. As a result, systems that transmit unencrypted data between credentials and readers pose a substantial risk. A critical part of this lies in the failure to treat physical security as a data security issue. Cybersecurity in access control is fundamentally about protecting sensitive data – whether stored on a card, smartphone or in the cloud. Cloud-based systems and mobile credentials further raise the stakes. Just as we trust banks to protect financial transactions online, physical security platforms must adopt equally stringent cybersecurity measures to maintain trust and safety.

Rohin Parkar Spintly

Physical security systems remain vulnerable to cyber-threats because their designers did not consider digital security during their initial development. Physical security technologies such as surveillance cameras and badge readers and smart locks received internet connectivity without proper cybersecurity protection measures. The gap between physical and cyber security teams grows because they function independently with separate tools and different priorities and protocols. The separation between teams prevents them from conducting unified risk assessments and weakens their ability to coordinate responses. The deployment of IoT devices with default settings and insufficient oversight makes them easy targets for attackers. The problem becomes worse because different teams lack common responsibility. Organisations maintain separate operational structures for physical security while they focus on cybersecurity protection for their IT systems. The lack of integrated threat detection allows damage to occur before security teams become aware of the issue. The exploitation of this disconnect will persist unless organisations establish joint governance and integrated monitoring systems and secure-by-design principles that treat cybersecurity as an essential part of physical systems.

Daniel Reichman Ai-RGUS

The biggest reason is simple: Physical security and cybersecurity have historically been treated as separate domains with different teams, priorities, and budgets. But today’s security systems are network-connected, and that separation no longer makes sense. Every camera, access control device, or NVR is now an endpoint, just like a laptop or server, and vulnerable to the same types of cyber-threats. In addition to cyber-threats, if a physical security device is compromised it can have real-world consequences such as degraded physical security, lack of evidence, and lack of control over access making them high value targets and critical to secure.

Nick Kathmann LogicGate

Physical security systems like access controls, surveillance cameras, and alarm infrastructures are generally an organisation’s first foray into operational technology (OT) networking, where they operate in isolated, highly segmented environments. However, in practice, many organisations do not have well-defined OT architectures in place. Whether it is for convenience or out of necessity, these systems often end up integrated into the traditional IT network and are rarely maintained or updated. Now connected to the broader IT environment, these security systems become easy targets for attackers, acting as a weak link that opens the door to deeper compromise across the organisation. Cyber-threats are becoming increasingly more complicated, and overlooking the risks tied to physical security infrastructure can be a costly mistake.

Jason Hunter Gallagher Security

In today’s connected world, cyber is at the heart of everything we do from communication to critical infrastructure. Edge devices, such as cameras and sensors, are particularly vulnerable, often lacking robust security protocols. The curb-to-core philosophy highlights the need to secure every layer, from perimeter defense to internal systems. Hostile Vehicle Mitigation blockers, for example, could be hacked, turning protective measures into threats. As NATO’s Secretary General Jens Stoltenberg stated in 2021, a cyber-attack can be as damaging as a military one, underscoring the severity of digital threats. With data now more valuable than oil or precious metals, protecting it is paramount. Yet, many physical security systems still overlook cybersecurity, leaving critical gaps that can be exploited. Strengthening cyber resilience is essential to safeguarding modern physical environments.