Industry Focus

Walking the Walk

If you attended ISC West last month, you already know the tradeshow was a smashing success. I suppose there are a few that weren’t completely satisfied, but I think overall, this year’s Las Vegas event experienced a well-received outcome. I loaded my schedule as full as possible and still didn’t have enough time to take it all in.

There were several takeaways from the show floor that we’re going to see a lot more of in 2017, and beyond. For starters, cybersecurity is now more than an up and coming concern. Everyone has this as a top of mind concern because once the network is safe, the security equipment will work at its optimum ability. I think we’re going to see camera manufacturers taking another hard look at how to secure the network. They’ve been talking about it, but now it’s time to walk the walk.

Physical and logical security depend on each other, so it is surprising to find that a number of companies still treat them separately, from both a device management and government agencies perspective. Until recently, this was justified because the technology to integrate physical and logical security was not available. Regarding security, most organizations have at least three buying and control centers. The first two are primarily concerned with IP theft, malware and viruses. NetOps handles network security, while InfoSec manages data at rest and data in transit security. The third is physical security, which includes surveillance and access control. In most organizations, the guard at the gates is a separate operations center.

Cybersecurity, meanwhile, depends greatly on physical security. Attackers who can gain physical access to a computer can almost always take advantage of that access to further their efforts. Merely getting access to a physical terminal where a memory device can be plugged in is usually sufficient. Any device present that is connected to the network must be protected to ensure that it cannot be turned into a tool to be used in an attack.

The lack of integration between physical and cybersecurity creates some following challenges.

  • No single system to identify a person’s identity because each functional security department controls its own identity database.
  • Increased potential for theft.
  • Lack of IT management and application of best practices applied to physical security devices, or a lack of best practices applied consistently across departments or organizations.
  • Lack of physical monitoring of logical security devices that can detect tampering; that is, unauthorized access to a logical security device console.

Like all effective security, cyber security is about the depth of your defense. It’s about appropriately protecting your IP camera network at every level—from the products you choose and the partners you work with to the requirements they, and you, set.

Your first layer of defense is choosing network video products with built-in protection: We make sure you can apply the security controls you need to mitigate the threats you face. Because there’s no one-size-fits-all solution to cyber crime, your second layer of defense is a good understanding of the threats you face, their potential costs and how to protect yourself.

Begin with best practices, timely response and transparency. Any end user should apply cybersecurity best practices in the design, development and testing of our products to minimize the risk of flaws that could be exploited in an attack. When critical vulnerabilities are discovered they should be fixed promptly and issue security advisories.

Your best cyber offense is a great cyber defense.

This article originally appeared in the May 2017 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

  • TSA Intercepts 6,678 Firearms at Airport Security Checkpoints in 2024

    During 2024, the Transportation Security Administration (TSA) intercepted a total of 6,678 firearms at airport security checkpoints, preventing them from getting into the secure areas of the airport and onboard aircraft. Approximately 94% of these firearms were loaded. This total is a minor decrease from the 6,737 firearms stopped in 2023. Throughout 2024, TSA managed its “Prepare, Pack, Declare” public awareness campaign to explain the steps for safely traveling with a firearm. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3