Why is cybersecurity a weak link for physical security systems?
- Lack of integrated cybersecurity exposes physical security systems to network vulnerabilities and threats.
- Physical security devices often operate with outdated protocols, creating long-term cybersecurity risks.
- Siloed teams and separated responsibilities weaken coordinated risk assessments and cybersecurity measures.
Editor Introduction
Physical security and cybersecurity are deeply intertwined in today’s systems. A weakness in one realm can quickly lead to a breach in the other, and vice versa. However, given the symbiotic relationship, why do physical security systems so often fall short when it comes to cybersecurity protection? We asked our Expert Panel Roundtable: Why does cybersecurity continue to be a weak link for physical security systems?
Cybersecurity remains a weak link because physical security gear is often deployed without best cybersecurity practices and then mounted, tested, and quickly forgotten. Critical security updates are rarely applied during the product lifecycle. Projects are judged on picture quality and uptime, so installers leave default passwords, open ports, and flat networks in place to meet schedules and budgets. Responsibility is splintered: Facilities own the devices, IT owns the switches, and the vendor owns the firmware, so no one owns patching or certificate renewals. Integrators rarely get paid to come back and harden gear, and busy security teams often underestimate the value of the video and access data flowing through these boxes. All the while, the devices sit deep inside trusted networks and make perfect launch pads for an attacker. Fixing the problem means treating cameras like any other endpoint, with secure defaults, easy fleetwide updates, and joint IT/physical security governance.
Cybersecurity is still a weak spot in physical security for a few key reasons. Many systems in use today are built on technology with outdated cybersecurity measures. Physical security equipment tends to last 10 to 20 years, and much of it was originally set up with insecure protocols, default passwords, and little to no encryption. That legacy creates a long-tail risk. There is also the issue of ownership. Physical security is often managed separately from IT, so updates and patches may not receive the same urgency or oversight. Some vendors are also slow to release patches or do not clearly communicate vulnerabilities and security updates. As systems become more integrated, complexity and security risks increase. These systems also need to run continuously, leaving little room for downtime. Cybersecurity must be a priority and a shared responsibility among the manufacturer, integrator, and end user to mitigate risks and ensure systems remain secure.
Despite significant advancements in access control technologies, cybersecurity remains a persistent vulnerability within physical security systems. This weakness stems not only from the evolving sophistication of cyber-threats but also from outdated mindsets and siloed organisational structures. Many organisations still approach physical security through a lens shaped decades ago - when systems using RFID cards with no encryption were sufficient. While these solutions may have functioned well in the past, the landscape has radically changed. Today, hacking tools capable of copying or cloning access credentials are widely accessible and inexpensive. As a result, systems that transmit unencrypted data between credentials and readers pose a substantial risk. A critical part of this lies in the failure to treat physical security as a data security issue. Cybersecurity in access control is fundamentally about protecting sensitive data – whether stored on a card, smartphone or in the cloud. Cloud-based systems and mobile credentials further raise the stakes. Just as we trust banks to protect financial transactions online, physical security platforms must adopt equally stringent cybersecurity measures to maintain trust and safety.
Physical security systems remain vulnerable to cyber-threats because their designers did not consider digital security during their initial development. Physical security technologies such as surveillance cameras and badge readers and smart locks received internet connectivity without proper cybersecurity protection measures. The gap between physical and cyber security teams grows because they function independently with separate tools and different priorities and protocols. The separation between teams prevents them from conducting unified risk assessments and weakens their ability to coordinate responses. The deployment of IoT devices with default settings and insufficient oversight makes them easy targets for attackers. The problem becomes worse because different teams lack common responsibility. Organisations maintain separate operational structures for physical security while they focus on cybersecurity protection for their IT systems. The lack of integrated threat detection allows damage to occur before security teams become aware of the issue. The exploitation of this disconnect will persist unless organisations establish joint governance and integrated monitoring systems and secure-by-design principles that treat cybersecurity as an essential part of physical systems.
The biggest reason is simple: Physical security and cybersecurity have historically been treated as separate domains with different teams, priorities, and budgets. But today’s security systems are network-connected, and that separation no longer makes sense. Every camera, access control device, or NVR is now an endpoint, just like a laptop or server, and vulnerable to the same types of cyber-threats. In addition to cyber-threats, if a physical security device is compromised it can have real-world consequences such as degraded physical security, lack of evidence, and lack of control over access making them high value targets and critical to secure.
Physical security systems like access controls, surveillance cameras, and alarm infrastructures are generally an organisation’s first foray into operational technology (OT) networking, where they operate in isolated, highly segmented environments. However, in practice, many organisations do not have well-defined OT architectures in place. Whether it is for convenience or out of necessity, these systems often end up integrated into the traditional IT network and are rarely maintained or updated. Now connected to the broader IT environment, these security systems become easy targets for attackers, acting as a weak link that opens the door to deeper compromise across the organisation. Cyber-threats are becoming increasingly more complicated, and overlooking the risks tied to physical security infrastructure can be a costly mistake.
In today’s connected world, cyber is at the heart of everything we do from communication to critical infrastructure. Edge devices, such as cameras and sensors, are particularly vulnerable, often lacking robust security protocols. The curb-to-core philosophy highlights the need to secure every layer, from perimeter defense to internal systems. Hostile Vehicle Mitigation blockers, for example, could be hacked, turning protective measures into threats. As NATO’s Secretary General Jens Stoltenberg stated in 2021, a cyber-attack can be as damaging as a military one, underscoring the severity of digital threats. With data now more valuable than oil or precious metals, protecting it is paramount. Yet, many physical security systems still overlook cybersecurity, leaving critical gaps that can be exploited. Strengthening cyber resilience is essential to safeguarding modern physical environments.
Editor Summary
Because many modern physical security systems are digitally controlled, a cyberattack could disable the systems and allow unauthorised physical access. Internet Protocol (IP) cameras and other monitoring devices are part of a network and can inadvertently be an electronic gateway to the rest of an IT system. Also, if an attacker gains control of video systems, they could disable cameras to hide a physical intrusion or even use them to spy on an organisation. Therefore, a comprehensive security strategy must integrate both cybersecurity and physical security, recognising that they are two sides of the same coin.
HID products
HID news
HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorisation Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...
HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organisations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink Beernink brings more than 2...
On Wednesday, November 19, starting at 08:00 CST, ASSA ABLOY hosts its Capital Markets Day in Milwaukee, Wisconsin, USA. Nico Delvaux, President & CEO and Erik Pieder, CFO, will provide an update on ASSA ABLOY’s strategy and direction, including an overview of the company’s strategic objectives and priorities to accelerate profitable growth. The financial targets of an EBIT-margin of 16-17% and annual sales growth of 10% over a business cycle are re-confirmed. No deta...
HID white papers
HID case studies
Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organisations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its app...
How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....
HID virtual events
Expert commentary
Security beat
Haverhill Business Park, Phoenix Road, Haverhill, Suffolk, CB9 7AE, United Kingdom
Telephone: +44 (0)1440 714 850
