From physical security to cybersecurity

Access & Identity Management Handbook 2020 Information Security, Security Services & Risk Management

Cameras, door controllers, and other physical security devices and systems are smarter and more powerful than ever before. As part of both public and private networks, they are increasingly interconnected. This facilitates their management, speeds up communications, and increases collaboration. Most importantly, they help security professionals keep people and organisations safe.

But this growing connectivity doesn’t only carry benefits. Emerging cyber threats, hazards, and criminal activity introduce new vulnerabilities and risks.

A poorly secured camera, unencrypted communications between a server and client application, or out-of-date firmware can all be exploited by cybercriminals. The result is clear: security systems can no longer focus solely on physical threats.

That’s why we believe that it is critical to have a security strategy to protect your system against both physical and cyber threats. Our solutions give you the tools you need to build a secure and compliant system. Because no single approach is enough, they include multiple layers of defence, such as encryption, multi-factor authentication, and authorisation. From devices to data storage on premise or in the cloud, we help you face new threats and keep your data and operations safe.

The growing risks of an interconnected world

Cybercriminals can cause massive disruption to the activities of both organisations and governments. In 2017, a major ransomware attack, known as WannaCry, affected people and organisations around the globe. It targeted systems running common, but outdated software. As a result, more than

230 000 computers in 15 countries were locked. To regain access to their data, organisations and users had to pay a large sum to the perpetrators. In many hospitals, medical records became encrypted, disrupting operations and threatening patient lives.

Emboldened cybercriminals have also increased the scope of their attacks, targeting private security cameras to access live video. While some of these attacks exploit simple vulnerabilities, such as default manufacturer passwords, others are more sophisticated and complex. Whether at work or at home, preventing strangers from accessing your cameras is no longer a simple affair.

With greater connectivity of systems over the Internet, a vulnerable device can become a gateway to your organisation’s data and sensitive information. Now, when you protect your physical security system, you are also working to safeguard all of the other systems and the information that is connected to the network. To achieve this, you need a new approach: a defence-in-depth strategy.

Developing a defence-in-depth strategy

As with any interconnected entity, security systems can be targeted. Hacking a security system can take any number of forms, including brute-force, packet-sniffing, and man-in-the-middle attacks. In some cases, cybercriminals are able to listen in and alter communications, even while users believe their system is secure. This variety of attack strategies requires an equal variety of defence layers.

At Genetec, we provide secure, audited and compliant solutions that help you protect privacy without compromising security. We help you incorporate multiple and varied lines of defence, otherwise known as a defence-in-depth cybersecurity strategy, to face common and emerging threats, and secure your environment. Data captured by our unified security system for management, analysis, and storage, is protected by strong encryption, authentication, and authorisation methods.

We work hand-in-hand with international associations to ensure that our solutions meet industry standards and adhere to the latest cybersecurity best practices. Penetration tests and audits are routinely conducted on our products to provide a complete assessment of the integrity of our solutions.

Make the information available to the right people

When it comes to protecting data, threats aren’t just coming from the outside. With more integration and collaboration between each part of our security systems, the paths to accessing sensitive data have multiplied.

That’s why you need to control who can see your data, and what they can do with it. The first step is to use strong authentication methods to prevent undesired access to your system. This keeps your video and data from getting into the wrong hands.

Once authenticated, the next step is to use authorisation to manage who can access what part of your security system. This allows you to restrict the scope of activity within the system by giving access rights to groups or individuals for resources, data, or applications, and by defining what users can do with these resources.

Keep out prying eyes

We help protect your data from malicious attacks in multiple ways. When we talk about the ‘security-of-security’, we’re talking about securing all aspects of your physical security system – including communications, servers, and data.


Video and data viewed and stored within our system, as well as communications with Genetec hardware, are fully encrypted. We also secure communications between our software and edge devices, and to the cloud. This way, even if an unauthorised person gained access, they wouldn’t be able to make sense of the data without the encryption key.

Protect everyone’s privacy

Looking after individuals and equipment often requires collecting personal data and monitoring public spaces. To meet regulations and public expectations, access to personally-identifiable data and footage needs to be controlled. By following a privacy-by-design approach, we make sure that you don’t have to choose between protecting the privacy of individuals and their physical security. Our products let you manage the access to sensitive data and allow you to protect the identity of anyone captured on video.

We ensure you have complete control over your data so that you can adjust your protection methods and processes to meet regulations such as the European General Data Protection Regulation (GDPR), and more importantly, build trust with your customers.

The human element

As important as technology is in protecting your organisation against cybercriminal activity, there is another factor at play: your people. The strongest encryption cannot defend your system against weak or compromised passwords. That’s why it’s important to implement the right processes and put proper training programmes in place. You need to educate employees on the IT best practices, and potential social engineering techniques they may face. For example, starting with simple tips on password creation, and ways to identify phishing emails from legitimate communications, will help mitigate the cyber risks.

As a provider of security, operations, and business intelligence solutions, we help you protect your organisation. We work tirelessly to inform you of new threats and help you close down vulnerabilities. We continue to work with our customers and partners to deliver solutions that provide the best protection now, and in the future.

Visit the Genetec Trust Centre to learn about our approach, and how we help secure your system, at genetec.com/trust

For more information contact Brent Cary, Genetec, [email protected], www.genetec.com

Article supplied by Genetec. The original article can be found at https://resources.genetec.com/cybersecurity-2/security-of-security-brochure


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
NEC XON disrupts sophisticated cyberattack
Information Security
NEC XON recently showcased its advanced cyberthreat detection and response capabilities by successfully thwarting a human-operated ransomware attack targeting a major service provider.

Read more...
What’s your cyber game plan?
Information Security
“Medium-sized businesses are often the easiest target for cyber criminals, because they are just digital enough to be vulnerable, but not mature enough to be fully protected," says Warren Bonheim, MD of Zinia.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.