Maintaining Your Cybersecurity

Today’s security networks have evolved from where they were 20 years ago. With these changes, we have seen many amazing advances in the technology and the connectivity between the systems which comprise today’s complex security systems. Through these advancements has also come concerns on how we secure these systems and the data within them. As we look through the headlines, it seems a new data breach or network vulnerability is exposed daily, and this is why securing our system should be a top priority.

In cybersecurity, many refer to the three pillars for security, which are confidentiality, integrity, and availability. But what do these pillars represent, and how do we address these? Confidentiality is often considered the primary goal of security. To maintain confidentiality, the system and data should only be accessible to authorized users. To address the concern or integrity, the system should employ functions to ensure the data is untampered and accurate. Finally, if a system is not available, then this can create additional risks for a company, which is why the systems should provide safeguards to provide access for authorized users to the data and system resources when they need it.

Like other IT systems, there are some similar components found in the security system, and we can apply the security capabilities in a similar fashion. In a typical security network, the components which should be secured are the endpoint devices, the network, and the data.

When addressing endpoint security, we need to look at devices such as cameras, recorders, and workstations. Each of these points represents a means to access the overall security system. The first line of defense for these devices should be implementing strong passwords and disabling default user accounts. Next, these devices should be regularly updated. While updates for cameras, recorders, and workstations may provide new functionality, they will often include fixes to known vulnerabilities found in these systems or implement new security functionalities. Additionally, many devices come enabled with a host of services that can be used by the customer. If these services are not used, then they should be disabled to minimize exposure on the network. Finally, logging of the endpoint devices and regular audits can reveal unexpected behavior or potential vulnerabilities in these devices.

As we move from the endpoint to the network, we need to identify how we can fortify the security network from cyber threats. The biggest concern with network security is access. Network resources, such as switches and routers, should be located in secure spaces where physical access is controlled. Further, if the system architecture permits the security system should be isolated from the corporate network. Segmentation can be achieved either by physically isolating the networks or by segmenting them through Virtual LANs. There are even technologies such as MAC filtering or 802.1X, which will only allow access to authorized devices.

Finally, to protect the data within the security system, we can take the following steps. First, defining user access to the system data is critical. Even though user access to the system may be controlled, when watching the video, users may use a personal electronic device to capture the data displayed on their screen. Implementing a “no personal electronic device” policy will further protect from data breaches. In the event data needs to be exported from the system, it should be done in an encrypted method. This safety measure ensures the data remains protected, and only an authorized user can decrypt the data for use.

Securing your security system should be a top priority, and it can be achieved with planning and proper implementation. Even with this, the system should be reviewed regularly to ensure the latest patches are applied, the security plan is in place and operational, and any new equipment or system integrating with the system meets the minimum standards in place for your system. These simple steps will help in maintaining your cybersecurity.

About the Author

Chris Garner is a product manager with Salient Systems.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.