SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Effective high-security wedge barriers by Delta
    • SCD secures major contract for HD MWIR detectors
    • ASSA ABLOY's Aperio: Revolutionising digital security
    • VIVOTEK supports ecological restoration in Taiwan
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Distology highlights the biggest trends which will impact the cybersecurity space in 2023

10 Jan 2023

Distology highlights the biggest trends which will impact the cybersecurity space in 2023
Contact company
Contact Distology
icon Add as a preferred source Download PDF version
Related Links
  • What security challenges are impacting the hospitality market?
  • Distology strengthens business proposition by acquiring Squareball
  • What will be the biggest surprise for security in 2023

From reassessing cybersecurity measures which were put in place during the pandemic and understanding how to recover from a cyberattack, to revised legislation, Distology highlights the biggest trends which will impact the cybersecurity space in 2023.

Recent research from the specialist IT cybersecurity distributor found that more than a third (36%) of IT leaders believe that attacks becoming more sophisticated and targeted in nature will be the biggest disrupter of the cybersecurity sphere over the next five years. For this reason, experts at Distology are predicting 2023 will be a year of consolidating cybersecurity solutions to ensure organisations are protected.

Rule-based security protocols

Some of the top trends in 2023, according to Distology, include:

Reassessing cybersecurity solutions post-pandemic: Email security, cloud security, API, XDR and even backup and recovery solutions all need to be reassessed now that hybrid working is here to stay and the cyber threats are more dynamic now.

Setting up simple rule-based security protocols isn’t enough to keep up with the threats

Setting up simple rule-based security protocols isn’t enough to keep up with the threats, let alone the future. The winning formula builds on traditional defences with artificial intelligence, human intelligence (SOC based analysts), and user communities all combining together to create organisation-specific context.

Cyber incident response

Preparing to recover will be key: Over the last three years, the way people work, shop and spend has changed considerably so, if it hasn’t been done already, organisations should be putting time in to explore disaster recovery, business continuity and cyber incident response policies and procedures.

Aside from documentation, IT leaders should also be considering the support they have lined up for cyber incident response. Solutions such as Check Point or WithSecure help put out fires and can even go as far as helping organisations to get back up and running after an attack.

After any form of cyberattack, recovering systems is crucial, so organisations should also consider having a backup and recovery solution (and even better, a backup and recovery service, like Harbor Solutions) in place, otherwise IT leaders are on their own when it comes to recovering systems.

Reviewing email security

They need to ensure they have enough of the right technology and services in place

Quality over quantity: Although it’s clear IT leaders will have to shift their focus in 2023, this doesn’t necessarily mean spending more on cybersecurity solutions. Instead, they need to ensure they have enough of the right technology and services in place to help protect the business and help it recover should the worst occur.

Organisations considering making changes to their cybersecurity strategy need to have identity and access management at the top of their agenda, as everything flows from here.

Reviewing email security platforms is also important as phishing is getting more sophisticated by the day, ransomware attacks are costing hundreds of thousands and dark web cybercrime-as-a-service are increasingly easy and cost effective to subscribe to (Splunk Data Security Predictions 2023).

Incorporate artificial intelligence

For this reason, organisations should be ensuring that their cybersecurity platform investments incorporate artificial intelligence and human intelligence as much as possible, as this will deliver more holistic protection and assistance should an attack or breach occur.

IT organisations should also ensure their business leaders are prepared on all fronts

Lastly, IT organisations should also ensure their business leaders are prepared on all fronts – business risk management now firmly sits in the digital domain as much as the physical.

This means knowing what solutions are in place, what part they play in a business continuity plan, how well-trained people are and how well planned the organisation’s response to incident and recovery is.

Supply chain cybersecurity management

Increased legislation: As the world gets used to the new ways of working, legislation is having to adapt. The UK’s National Cyber Security Centre (NCSC) has already revised its Cyber Essentials+ programme and the EU has also released some guidance around cyber recovery, which will help inform and prepare organisations should they need to recover from an attack.

Over the next 12 months, the industry will start to see these legislations and restrictions trickle down in to their organisation, while IT leaders will face more pressure when it comes to supply chain cybersecurity management and assurances – this is where, in the UK, Cyber Essentials+ will really help.

Many organisations will need ISO27001 compliance, or at least alignment, and, if operating within or with US companies, SOC2 is a must. New, SME-centric, innovative security compliance automation platforms, like Drata, will help organisations ensure they’re compliant with updated legislations on an ongoing basis. These platforms also offer a high level of efficiency.

Top-down organisational readiness

Cybersecurity needs to form part of all organisational culture in the same way"

“As we enter the new year, there will be a need across the board for general revisions to cybersecurity strategies and policies to ensure organisations are protected and prepared in 2023.”

“Ultimately there will be new cybersecurity threats appearing in 2023 which IT leaders need to be prepared for. However, the biggest threat will always be the well-meaning insider – whether it’s something silly they do, or they’re compromised by a threat actor, the focus is to breach organisations via their people. With cyber resilience high on the agenda, the second level of threat is top-down organisational readiness. To achieve this, cybersecurity needs to form part of all organisational culture in the same way that physical security has for decades.”

Organisations clear guidance

“For this reason, it’s positive to see that legislation, guidance and training is changing to align with the ever-evolving threat landscape. When it comes to legislations, there are some which are in place which we’ve grown used to, such as ISO27001 and UK-GDPR, and these give organisations clear guidance on what they need to do to protect themselves, their people, their customers and their data from breaches, so the upgrades to legislation will only bolster this understanding,” comments Lance Williams, Chief Product Officer at Distology.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail surveillance
  • Electronic security systems
  • Shop security systems
  • Application security
  • Mall security
  • Perimeter security
  • Shopping centre security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security access systems
  • Radio frequency Identification
  • Video analytics
  • Electronic access control
  • Identity management
  • Building security
  • Facility security
  • Store security
  • Store surveillance
  • Institute security
  • Door access control
  • Security software
  • Human area network
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Integration software
  • Perimeter protection
  • Cyber security
  • Data Security
  • Incident Management
  • Cloud security
  • Mobile access
  • GDPR
  • COVID-19
  • Touchless Security
  • Related links
  • Access Control Software Access control software
  • Biometric Access control systems & kits
  • Biometric Access control software
  • Standalone / Networked Access control systems & kits
  • Contact Access control software
  • Broadcast Messenger Access control software
  • Proximity Access control systems & kits
  • Mifare Access control software
  • Card Printer Access control software
  • Proximity Access control software
  • Contact Access control systems & kits
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Guard Tour Access control software
  • ID Badging Software License Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • NetVue Interface to Nice Systems Access control software
  • Reporting Option Access control software
  • Serial Interface Option Access control software
  • User tool for control panel Access control software
  • Version Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
Effective high-security wedge barriers by Delta

Effective high-security wedge barriers by Delta

What’s behind (perimeter) door #1?

What’s behind (perimeter) door #1?

TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec