Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access ControlThe recent, widely publicized upsurge of cyber attacks on major retailers has brought the need for stronger security controls to the forefront of the retail industry. Regulatory bodies are placing a stronger emphasis on consumer data protection, making it more important than ever for retailers to ensure that their security administration complies with industry standards.

For IT managers tasked with securing retailers’ customer information, implementing the appropriate software programs is essential, but they must ensure physical security of this data as well. IT managers can safeguard valuable consumer information within the data center by extending the same level of security used to access the building perimeter down to the server cabinets and enclosures that house customer data.

Intelligent electronic locks, for instance, offer an extra layer of access to existing physical security solutions when integrated into server cabinets. When combined with access control devices, such as RFID card readers, rack level electronic locks can be networked with the building’s security system to create one cohesive security network. This network can then be used across the data center to control access and demonstrate compliance with data protection regulations.

Meeting Compliance Requirements

Physical security is critical in the protection of valuable data and IT infrastructure, and is mandated by regulatory initiatives that affect the retail industry. Retailers found with non-compliance of industry standards and consumer protection laws that they face significant fines and penalties.

The Payment Card Industry Data Security Standard (PCI DSS), for example, advises the technical and operational requirements for protecting the information of credit card holders. PCI DSS includes standards for tracking and monitoring access to network resources and cardholder data, which includes server cabinets that house this information. Non-compliance with PCI DSS can result in fines, card replacement costs, costly forensic audits and brand damage in the event a breach does occur.

Electronic access solutions can be used to reduce the risk of non-compliance with PCI DSS due to the audit trail capabilities they provide. Electronic locks and access control devices can be integrated with the facility’s security network so access can be monitored in real time – from building entry down to equipment access. When a data center cabinet is opened or closed, a signal is sent to a monitoring system to confirm and log access. This digital record of activity can then be used to demonstrate accountability and reconstruct security breaches should they occur.

Identifying Authorized Personnel

Networked electronic access solutions work with existing user credentials to keep server racks secure, providing an extra layer of security to enclosures that contain wireless access points, network jacks, gateways, handheld devices, networking communications hardware and telecommunications lines.

A complete solution, which includes an access control or input device, an electromechanical lock or latch and remote monitoring capabilities, can connect building security and rack level access though a simplified, flexible platform. Securing server cabinets with electromechanical locks eliminates key inventory and distribution issues commonly associated with mechanical locking mechanisms and ensures that only authorized personnel have access to sensitive equipment and information.

For instance, many data centers already use electronic access control devices like RFID cards and unique pin codes to identify employees, and restrict or grant access to specific areas within the data center. Electronic locks that have been networked into the data center’s security infrastructure can be activated using existing user credentials. Access can then be easily restricted or granted by the IT manager as required.

Electronic locks can also be linked to security and environmental systems. Connecting them to IP video cameras and rack monitoring systems gives facility managers an additional tool for tracking access activity. Additionally, in the event of a power failure, electronic locks can also be equipped with a mechanical override system that enables manual access to enclosures.

Preparing for the Future

As the retail industry continues to expand the scope of its security administration to prepare for the ongoing risk of security breaches, IT managers must extend security measures down to the rack level. IT managers can ensure compliance and prevent data breaches by adding access control devices to the data center enclosures and cabinets that house retailers’ consumer information. By replacing traditional lock-and-key mechanisms with electronic locks and access controllers, IT managers can leverage existing employee ID badges and credentials to promote accountability, protect customer information and ensure compliance with industry regulations.

About the Author

Steve Spatig is general manager of Southco’s Electronic Access Solutions Strategic Business Unit and has over 15 years of experience working in various design engineering and product management capacities with the company.

Featured

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3