From the Most Visible to the Less Apparent

The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.”

Of the ones CISA lists people are likely most concerned about communications, information technology (IT), emergency services, healthcare, energy, financial services, transportation systems and commercial facilities such as sports and entertainment venues.

After all, these tend to be the sectors we personally rely on most or frequent regularly. They’re also among those we instantly hear about whenever there’s breaking news surrounding a cyberthreat, natural disaster, attack, or other disruption.

Manned and Unmanned
Critical infrastructure facilities can be staffed or unmanned. Manned locations include airports, data centers, and hospitals that have readily visible onsite security staff and video surveillance cameras, as well as added monitoring technology and robust access control protocols.

These sectors often fortify perimeters with sturdy yet attractive bollards and fences to deter vehicle intrusions. In the case of enterprise and collocation data centers, reinforced concrete exteriors and storm-rated doors can also be common depending on data sensitivity and whether sites are prone to natural disasters and other factors. Even with hardened spaces and robust screening, there is always the possibility of security gaps that need to be filled.

The healthcare industry, for instance, has been forced to add more stringent steps to counteract the costly ransomware and cyber-attacks they have experienced in recent years. While rare, these events are extremely serious. Healing environments are complex enough without added security issues. Addressing these challenges is essential to assuring well-being and confidential information are never compromised.

Measures and technologies for safeguarding critical infrastructure range from the obvious like guards, cameras, and scanning equipment to more discreet solutions like user-friendly access credentials for individuals.

Take advanced door security solutions which are crucial to the safety of crewed and unmanned sites alike. Electronic access control, for example, now includes easy-to-use biometrics like facial identification and mobile credentials for reliable authentication. Both provide robust security.

The same goes for innovations in intelligent key and lock systems that are being deployed to better protect the openings of a wide range of remote unmanned critical infrastructure, including facilities for power generation and water quality, and equipment for maintaining traffic flow.

Most people driving our roads do not give much thought to how traffic lights function. Nor do they likely notice the big cabinets at every intersection that house sophisticated equipment for the signals. These expensive electronics not only control the lights, but they also connect to and transmit data over a statewide communications network – infrastructure that could be seriously breached if these cabinets are easy to break into or inadvertently left unlocked.

What might come as a surprise is how doors on these cabinets are still latched with a standard mechanical lock and key, just like they have been for decades. These obsolete locks are still vulnerable to being compromised and have keys that are more likely to be lost or fall into the wrong hands without a trace. It doesn’t take much to imagine the potential havoc that could unleash.

The good news is more U.S. departments of transportation are switching to intelligent cylinder locks and keys for control cabinets. Products like Medeco XT, for example, are simple to retrofit and easy to program through web-based software to grant, revoke and schedule access.

Although the XT lock is offline, software can connect to the intelligent key either physically or by BLE to generate audit reports for verifying which technicians or contractors have accessed a cabinet as well as its lock status history.

Learn how well this solution is working for the Virginia Department of Transportation.

Solutions like HES 630REL Series powered locks go a step further by featuring online connectivity to check a cabinet’s lock status in real time and a motor drive for instant remote locking if necessary.

Some state DOTs also have hub stations, which could be considered mini-data centers. These are usually 20’ x 20’ unmanned buildings with server racks and network gear that connect to various traffic cabinets in a region. Their remote locations also require solutions like those from

HES, not only for a building’s exterior locks but also for the server racks inside.

Just as vital are unmanned power generation and distribution sites such as solar and wind farms and electric utility substations. Too many of these critical locations and their control equipment spaces are also still only secured with a basic mechanical lock and key; some even with just a padlock. The same goes for EV charging station hubs, wastewater processing sites, gas pipeline control cabinets, and cell tower hubs.

Just think of the hundreds of thousands of cell tower sites throughout our country. Like traffic light intersections, most people do not realize that each of them also has an enclosure housing vital equipment that needs robust safeguarding from vandalism, theft, and ultimately, the loss of communication that we depend on for everything from sharing a baby picture to an urgent call for help.

That is why it is amazing to learn how keeping our critical infrastructure safe and secure simply boils down to keeping its vital components under the most trustworthy and intelligent lock and key and access control solutions.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.