HID Global Security Survey and Infographic Reveal Best Practices for Physical Access Control

HID Global, a manufacturer of secure identity solutions, released an infographic illustrating the results of a survey it conducted on physical access control.  HID Global Security Survey and Infographic Reveal Best Practices for Physical Access ControlThe survey of 600 respondents revealed enterprise end users’ perceptions about change and the importance of industry best practices, and how well today’s technology and policy best practices are being implemented. The attitudes uncovered in the survey affect how well organizations can defend against increasingly dangerous and costly security threats, both now and in the future.

“This survey raises questions about how well organizations are keeping up with the bad guys,” said John Fenske, vice president of product marketing, Physical Access Control with HID Global. “Complacency isn’t wise, however, and adherence to industry best practices will be increasingly critical in order to take advantage of the coming generation of technologies and capabilities, including mobile access control on smartphones. A reliance on legacy infrastructure, technology and mindsets will make it hard to keep up with today’s technology advances that address a world of increasingly sophisticated threats.”

HID Global’s infographic combines results from its survey with published data on security breaches and associated costs. Key findings incorporated into the infographic include:

  • Only 37 percent of users perform annual security assessments, and most users do not contract a third party to test their existing PACS. This means users either conduct their own security audits or penetration exercise internally, or do not test their systems at all.
  • More than half of respondents have not upgraded in the last year, and more than 20 percent haven’t upgraded in the last three years.
  • 75 percent of end users said cards with cryptography were important. The majority also believes that magstripe and proximity technologies provide adequate security, despite their vulnerability to cloning.
  • 75 percent of respondents state that the highest-security technologies were important or very important, but half said they weren’t implementing them well, or at all. Over 90 percent felt the most secure policies were important or very important, with only 70 percent felt they were implementing them effectively or very effectively.
  • Biggest barriers to best-practice implementation were budget-related and management not seeing value in the investment. Yet the cost of not investing in best practices can be very high – for example, $5.4 million for a data breach, according to Ponemon Institute.

HID Global believes that current perceptions about access control will have an impact on the adoption of future technologies. For instance, mobile access control on smartphones will enable a more hassle-free access control experience for users, who can carry all of their keys and credentials on a device they carefully protect and rarely lose or forget. However, if the market continues to delay shoring up its best practices now against today’s threats to traditional cards and readers, it will be difficult for enterprise infrastructures to seamlessly move to digital credentials carried on smartphones in a BYOD deployment environment with new and different security threats.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.