From physical security to cybersecurity

Access & Identity Management Handbook 2020 Information Security, Security Services & Risk Management

Cameras, door controllers, and other physical security devices and systems are smarter and more powerful than ever before. As part of both public and private networks, they are increasingly interconnected. This facilitates their management, speeds up communications, and increases collaboration. Most importantly, they help security professionals keep people and organisations safe.

But this growing connectivity doesn’t only carry benefits. Emerging cyber threats, hazards, and criminal activity introduce new vulnerabilities and risks.

A poorly secured camera, unencrypted communications between a server and client application, or out-of-date firmware can all be exploited by cybercriminals. The result is clear: security systems can no longer focus solely on physical threats.

That’s why we believe that it is critical to have a security strategy to protect your system against both physical and cyber threats. Our solutions give you the tools you need to build a secure and compliant system. Because no single approach is enough, they include multiple layers of defence, such as encryption, multi-factor authentication, and authorisation. From devices to data storage on premise or in the cloud, we help you face new threats and keep your data and operations safe.

The growing risks of an interconnected world

Cybercriminals can cause massive disruption to the activities of both organisations and governments. In 2017, a major ransomware attack, known as WannaCry, affected people and organisations around the globe. It targeted systems running common, but outdated software. As a result, more than

230 000 computers in 15 countries were locked. To regain access to their data, organisations and users had to pay a large sum to the perpetrators. In many hospitals, medical records became encrypted, disrupting operations and threatening patient lives.

Emboldened cybercriminals have also increased the scope of their attacks, targeting private security cameras to access live video. While some of these attacks exploit simple vulnerabilities, such as default manufacturer passwords, others are more sophisticated and complex. Whether at work or at home, preventing strangers from accessing your cameras is no longer a simple affair.

With greater connectivity of systems over the Internet, a vulnerable device can become a gateway to your organisation’s data and sensitive information. Now, when you protect your physical security system, you are also working to safeguard all of the other systems and the information that is connected to the network. To achieve this, you need a new approach: a defence-in-depth strategy.

Developing a defence-in-depth strategy

As with any interconnected entity, security systems can be targeted. Hacking a security system can take any number of forms, including brute-force, packet-sniffing, and man-in-the-middle attacks. In some cases, cybercriminals are able to listen in and alter communications, even while users believe their system is secure. This variety of attack strategies requires an equal variety of defence layers.

At Genetec, we provide secure, audited and compliant solutions that help you protect privacy without compromising security. We help you incorporate multiple and varied lines of defence, otherwise known as a defence-in-depth cybersecurity strategy, to face common and emerging threats, and secure your environment. Data captured by our unified security system for management, analysis, and storage, is protected by strong encryption, authentication, and authorisation methods.

We work hand-in-hand with international associations to ensure that our solutions meet industry standards and adhere to the latest cybersecurity best practices. Penetration tests and audits are routinely conducted on our products to provide a complete assessment of the integrity of our solutions.

Make the information available to the right people

When it comes to protecting data, threats aren’t just coming from the outside. With more integration and collaboration between each part of our security systems, the paths to accessing sensitive data have multiplied.

That’s why you need to control who can see your data, and what they can do with it. The first step is to use strong authentication methods to prevent undesired access to your system. This keeps your video and data from getting into the wrong hands.

Once authenticated, the next step is to use authorisation to manage who can access what part of your security system. This allows you to restrict the scope of activity within the system by giving access rights to groups or individuals for resources, data, or applications, and by defining what users can do with these resources.

Keep out prying eyes

We help protect your data from malicious attacks in multiple ways. When we talk about the ‘security-of-security’, we’re talking about securing all aspects of your physical security system – including communications, servers, and data.


Video and data viewed and stored within our system, as well as communications with Genetec hardware, are fully encrypted. We also secure communications between our software and edge devices, and to the cloud. This way, even if an unauthorised person gained access, they wouldn’t be able to make sense of the data without the encryption key.

Protect everyone’s privacy

Looking after individuals and equipment often requires collecting personal data and monitoring public spaces. To meet regulations and public expectations, access to personally-identifiable data and footage needs to be controlled. By following a privacy-by-design approach, we make sure that you don’t have to choose between protecting the privacy of individuals and their physical security. Our products let you manage the access to sensitive data and allow you to protect the identity of anyone captured on video.

We ensure you have complete control over your data so that you can adjust your protection methods and processes to meet regulations such as the European General Data Protection Regulation (GDPR), and more importantly, build trust with your customers.

The human element

As important as technology is in protecting your organisation against cybercriminal activity, there is another factor at play: your people. The strongest encryption cannot defend your system against weak or compromised passwords. That’s why it’s important to implement the right processes and put proper training programmes in place. You need to educate employees on the IT best practices, and potential social engineering techniques they may face. For example, starting with simple tips on password creation, and ways to identify phishing emails from legitimate communications, will help mitigate the cyber risks.

As a provider of security, operations, and business intelligence solutions, we help you protect your organisation. We work tirelessly to inform you of new threats and help you close down vulnerabilities. We continue to work with our customers and partners to deliver solutions that provide the best protection now, and in the future.

Visit the Genetec Trust Centre to learn about our approach, and how we help secure your system, at genetec.com/trust

For more information contact Brent Cary, Genetec, [email protected], www.genetec.com

Article supplied by Genetec. The original article can be found at https://resources.genetec.com/cybersecurity-2/security-of-security-brochure


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.