Posted inSecurity

A proactive approach to cyber and physical security

Being proactive is the first line of defense. Here are some considerations to take as you seek to protect against cybersecurity threats to your systems

In a recent survey conducted by Genetec, 36% of respondents globally said they were looking to invest in cybersecurity-related tools to improve their physical security environment in the next 12 months. In an industry where cybersecurity has not always been top of mind, the results of the survey demonstrate that respondents are starting to recognise that these cyber threats are real and their physical security systems are a potential platform for cyber-attacks.

IoT devices have improved security and monitoring in large, distributed spaces, benefitting organisations. By enabling the advancement of smarter cities, they are a crucial part of national agendas like Saudi Vision 2030 and UAE Vision 2031. However, connectivity, accessibility, mobility, and data sharing come with cybersecurity risks. Video surveillance cameras, access control readers, and alarm panels could provide entry points to access enterprise networks via physical security systems.

Ephrem Tesfai writes about a proactive approach to cyber and physical security
Ephrem Tesfai, Sales Engineering Manager of Genetec

Securing these devices is paramount, and effective access management strategies are essential. Companies are now more aware of the need to safeguard against cyber threats and protect their vulnerable IoT devices.

What can organisations do to mitigate cybersecurity threats?

Being proactive is the first line of defense. Here are some considerations to take as you seek to protect against cybersecurity threats to your systems, as well as stay compliant with cybersecurity standards and laws.

  • Partner with a physical security provider who makes cybersecurity a top priority

Select a physical security provider that invests heavily in cybersecurity. There are several questions to help further identify whether they are taking the necessary cybersecurity precautions. For example, are they certified by a third party? Are they SOC2 compliant? Are they ISO 27001 certified? Are they using IT security best practices? Consider selecting a physical security provider that prioritises cybersecurity through dedicated teams and vendor partnerships with the same commitment.

Certain cybersecurity measures are hard to implement at scale, for example, updating firmware or changing passwords. A company that is committed to cybersecurity will help you develop the right cybersecurity posture to scale. They can vet their suppliers and partners of IoT devices to ensure they have the maturity and longevity to meet your cybersecurity needs both now and as your organisation grows. Likewise, they will partner with suppliers that share the same vision of the importance of cybersecurity.

  • Consider solutions with built-in cybersecurity measures

 Although a physical security system could be threatened, there are many ways to further mitigate the risk of malicious attacks. Deciding on a solution requires companies to determine whether the solution is designed with security in mind and has built-in cybersecurity measures. When a product is designed, built, coded, and tested with security by default, essential features such as authentication, authorisation, encryption, and privacy are built into the system. These measures also ensure only those with set privileges will be able to access specified assets, data, and applications.

  • Minimise vulnerabilities by moving to a hybrid or cloud approach 

Moving your physical security to the cloud or using a hybrid approach can further mitigate your cybersecurity risks. Modern cloud systems include many layers of cybersecurity designed not only to protect against malicious actors but also human error. 

Adopting a cloud-based security solution enables sharing cybersecurity responsibility with providers who offer advanced security measures and streamline maintenance and updates. Cloud solutions provide the latest built-in cybersecurity features, including privacy controls, strong user authentication, and system health monitoring tools. Updates and latest versions are automatically pushed to the system, ensuring protection against vulnerabilities and active monitoring for cyberattacks.

Where cyber and physical security meet

The Middle East is a prime target for cyberattacks due to its strategic location and significant role in the global economy. The region was among the top five countries and regions for the highest average cost of a data breach, with an estimated cost of USD 7.46 million, according to IBM’s 2022 Cost of Data Breach report.

Physical security and cybersecurity are interconnected. Incorporating security and privacy-by-design features in physical security systems can provide better protection for people, spaces, and assets. Similarly, partnering with a reliable provider can ensure an end-to-end security approach for the entire ecosystem’s design, build, and management. To keep up with the region’s rapid technological advancements, organisations must remain vigilant and adopt a holistic security approach that includes physical and cybersecurity measures.