SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Is greater awareness helping to increase cybersecurity?

6 Jun 2019

Is greater awareness helping to increase cybersecurity?
3 Jun 2019

Editor Introduction

Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?


Card image cap
Andreas Pettersson Arcules

I could not agree more that greater awareness is a key contributor to the increase in attention to the cybersecurity of physical security systems. The main takeaway from this cyber revolution is that the more we learn about the cloud and the Internet of Things (IoT), the more capable we are of strengthening them to meet the demands of today’s risk landscape. Manufacturers are factoring in cybersecurity more and more to a product’s design, with a layered approach across its lifecycle for consistent protection, which would likely not have happened without the cybersecurity awareness we’ve seen emerge. The demand from end users for a solution they can trust has increased significantly as the knowledge of cybersecurity has risen, which we can expect to see continue moving forward.

Card image cap
Hank Monaco Johnson Controls, Inc.

Facility managers and owners are concerned now more than ever about securing their building systems against cyber threats, especially their physical security systems. As systems integration plays a larger role in a smarter, safer and more connected building strategy, physical security solutions are at a greater risk to fall victim to cyber-attacks if there isn’t a cybersecurity strategy in place. For example, access control, which can house occupant information via a badge system, must be properly protected from malicious software and hacker threats or else occupant data is never fully secure. Whether protecting sensitive data or reducing system risk, security integrators must stay abreast of the latest cyber trends to help address potential threats and proactively mitigate cyber-related problems for their customers.

Card image cap
Drew Alexander STANLEY Security

On a daily basis, we hear of widely publicised cybersecurity incidents which affect our customer’s businesses, peace of mind, and assets. This new world is one the physical security industry has not been familiar with. What follows these well-publicised events is frustration and confusion, particularly for small and medium-sized businesses. Confusion then leads to application of ineffective security tools or, worse, inaction. The physical and network security industries continue to converge. Our customers will change, and the overall security budget will continue to be shared between addressing physical space security requirements (door access, video surveillance, intrusion detection, and fire monitoring) and delivering a continuous solution for overall network security. Those who choose to educate themselves on the problem(s), as well as the proper tools, will be leaders in serving their customers most effectively. The integrator channel should deliver both physical and network security at an efficient, cost-effective level.

Card image cap
Alan Stoddard Intellicene

The cybersecurity threats of today are complex and sophisticated, which means reactivity is no longer an acceptable response. With the high-stakes task of keeping data, people, and property safe from a potential breach, a proactive approach is essential to avoid business disruption and catastrophic damage to an organisation's reputation. Yes, awareness is helping increase cybersecurity, but more must be done to achieve measurable results. When designing security infrastructure, most solutions are based on dozens of separate systems that produce an overwhelming amount of siloed data. Because of a lack of integration, organisations can struggle to create connections between multiple security sensors to glean useful intelligence. By building information security operations centres (ISOCs) that collect and transform data within a unified platform, operators can obtain insights they need to establish a proactive approach that can guide investigations and identify and remedy cyber-attacks to minimise damage and ultimately prevent them from occurring.

Card image cap
Scott Brothers Oncam

As we've seen over the last several years, cybersecurity is at the top of everyone's concerns. But it wasn't until organisations started to feel the effects of cyber-attacks that the industry started paying attention to the processes by which solutions were built and protected. This, in part, can be attributed to greater awareness and the negative repercussions of significant breaches. While in some cases, manufacturers have addressed these concerns within physical security systems, it's an ever-evolving issue that no one can ever truly “solve.” The solution — aside from continued awareness — is that we as an industry have to keep focusing on it and trying to work toward the protection of our networks, day in and day out. Of course, challenges will continue to be presented with regard to strengthening cybersecurity protocols, so we all have to keep evolving and moving forward in a concerted effort to thwart threats.

Card image cap
Per Björkdahl ONVIF

Cybersecurity has many moving parts, so increased awareness of vulnerabilities is a great first step. However, a heightened awareness does not necessarily equate to an increase in best practices. People certainly have a different attitude towards aspects of cybersecurity compared to five years ago, but there are so many different facets to it that it is impossible to say that increased awareness increases the cybersecurity of physical security systems in general. For example, people seem to use passwords more correctly than they have in the past, but that is just one small aspect of keeping things secure. Awareness is great, but an increase in best practices all around is what will really combat cybersecurity threats.

Card image cap
Brandon Reich Pivot3, Inc.

Globally, there's been increasing awareness about cyber threats and the potential damage that can be caused by not addressing cybersecurity concerns from a very early stage. As a result, it has become more vital than ever to protect physical security systems such as video surveillance to ensure critical and sensitive information is secure and safeguarded from unauthorised use. One step in achieving this is through the deployment of infrastructure solutions that employ advanced cybersecurity technologies. A threat could enter from anywhere in an organisation’s ecosystem, and regardless of the nature of the attack, the cyber criminal’s goal is to exploit vulnerabilities quickly and profit from them. Therefore, we as an industry need to provide products and services that deliver resilient protection methods, align with current IT processes, and take advantage of modern technology such as data encryption— all of which will become more prominent as cybersecurity awareness rises.

Card image cap
John Davies TDSi

In an age where most of our personal data is held online, you would like to think there is greater awareness of the need for diligent cybersecurity, but I suspect the weak point for many systems is the humans using them! A recent survey by the NCSC (National Cyber Security Centre – part of the UK Government Communications Headquarters, GCHQ) showed that many people still use easily-guessed passwords and only 15% say they know a great deal about protecting themselves online. Unfortunately, there seems to be an urgent need for more education on the importance of good password protection. Linking cybersecurity and physical security is still the best approach, as it allows security and management teams to oversee all the protected areas and to act quickly during an incident. However, any security system can be compromised if individuals or the organisation as a whole are lax with password protection.

Card image cap
Alex Johnson Verint Systems

Greater awareness of cybersecurity threats is absolutely improving the cybersecurity of physical security devices. As a result, we see increased focus on the mitigation of IT threats from both manufacturers and the end users. Manufacturers are adding additional encryption to their solutions, as well as conducting third-party penetration testing to improve the security of their solutions. From both the hardware and software side, we are also seeing product vendors working together to develop comprehensive cybersecurity solutions to create a multi-layered cyber defence strategy. End users are employing a similar approach by architecting networks to be more secure as well as adding additional layers of cybersecurity threat protection. Overall, the growing awareness of cyber risks is propelling organisations to take a more proactive approach to risk management — and that is a great thing for our industry.


Editor Summary

The first step to solving any challenge is to know it exists. Relating to cybersecurity challenges in the physical security market, it is safe to say that the first step has been achieved. We are all talking more about cybersecurity than ever before, and that awareness is also driving realistic approaches to address the bigger problem. However, as our Expert Roundtable Panellists point out, there is much still to be done.

  • Related links
  • Johnson Controls Limited Access control systems & kits
  • TDSi Access control systems & kits
  • Related categories
  • Access control systems & kits
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Round table discussions
About this page

Boost cybersecurity awareness through employee training, implementing strong password policies and updating software to protect sensitive data effectively.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec