HID Global Security Survey and Infographic Reveal Best Practices for Physical Access Control

HID Global, a manufacturer of secure identity solutions, released an infographic illustrating the results of a survey it conducted on physical access control.  HID Global Security Survey and Infographic Reveal Best Practices for Physical Access ControlThe survey of 600 respondents revealed enterprise end users’ perceptions about change and the importance of industry best practices, and how well today’s technology and policy best practices are being implemented. The attitudes uncovered in the survey affect how well organizations can defend against increasingly dangerous and costly security threats, both now and in the future.

“This survey raises questions about how well organizations are keeping up with the bad guys,” said John Fenske, vice president of product marketing, Physical Access Control with HID Global. “Complacency isn’t wise, however, and adherence to industry best practices will be increasingly critical in order to take advantage of the coming generation of technologies and capabilities, including mobile access control on smartphones. A reliance on legacy infrastructure, technology and mindsets will make it hard to keep up with today’s technology advances that address a world of increasingly sophisticated threats.”

HID Global’s infographic combines results from its survey with published data on security breaches and associated costs. Key findings incorporated into the infographic include:

  • Only 37 percent of users perform annual security assessments, and most users do not contract a third party to test their existing PACS. This means users either conduct their own security audits or penetration exercise internally, or do not test their systems at all.
  • More than half of respondents have not upgraded in the last year, and more than 20 percent haven’t upgraded in the last three years.
  • 75 percent of end users said cards with cryptography were important. The majority also believes that magstripe and proximity technologies provide adequate security, despite their vulnerability to cloning.
  • 75 percent of respondents state that the highest-security technologies were important or very important, but half said they weren’t implementing them well, or at all. Over 90 percent felt the most secure policies were important or very important, with only 70 percent felt they were implementing them effectively or very effectively.
  • Biggest barriers to best-practice implementation were budget-related and management not seeing value in the investment. Yet the cost of not investing in best practices can be very high – for example, $5.4 million for a data breach, according to Ponemon Institute.

HID Global believes that current perceptions about access control will have an impact on the adoption of future technologies. For instance, mobile access control on smartphones will enable a more hassle-free access control experience for users, who can carry all of their keys and credentials on a device they carefully protect and rarely lose or forget. However, if the market continues to delay shoring up its best practices now against today’s threats to traditional cards and readers, it will be difficult for enterprise infrastructures to seamlessly move to digital credentials carried on smartphones in a BYOD deployment environment with new and different security threats.

Featured

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.