Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesVideo SurveillanceCybersecurity News

How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

By Mathieu Chevalier
cloud-enews
January 30, 2018

Today, cybersecurity is on all our minds. Every other day, we get news of another cyberattack. As more organizations struggle to keep up with the onslaught of these new threats, many are asking: “What can we do to strengthen our cybersecurity posture?” When we want to quantify it, consider the concept of risk. In its simplest form, the risk associated with a system is the impact of it malfunctioning, multiplied by the likelihood that a malfunction will occur.

Even security systems, networks, and their configurations can be susceptible to potential cyber-attacks. All departments – not just the security department – need to be properly informed on these potential threats. For example, engineering and procurement (just to name two) departments need to be fully aware of the risks associated with procurement decisions based solely on price, without taking into consideration any possible cybersecurity weaknesses or vulnerabilities. Technology manufacturers should be held accountable for protecting their sales distributors and customers from exploitations of their hardware – working in partnership to ensure businesses and their data are adequately protected.

Intentional and Unintentional Risks

Today, a company can be at the mercy of an employee who unintentionally opens the content of a malicious email. For an attacker, this is quite often the easiest and most effective way to gain access and compromise a company’s confidential data. To protect your organization against this type of attack, users need to be properly educated to reduce this careless, high-risk behavior.

An organization’s focus should be on those who are in contact with the outside: Who can reach them? How can they be reached? How do they respond? These are the types of questions a company’s physical and cyber security teams need to jointly ask and manage.

Take the supply chain for example. This department represents a potential vector for an enterprise attacker. Companies, becoming increasingly aware of this risk, are taking steps to mitigate the possibility of a potential attack. Some go so far as to make static analysis or penetration tests on the products of their suppliers to ensure the solutions are robust and successfully “hardened” against cyberattacks.

Securing the Future with the Cloud

In the coming years, more organizations will leverage the cloud to help address many of today’s cybersecurity issues. The Cloud offers additional security for when making decisions on procuring new hardware and software. Education-by-example is a method that works well. By training all the employees and members of your organization on the benefits of the Cloud, and how it can facilitate cybersecurity, they will gain the knowledge to make better decisions that will keep their organization safe. When shown how easy it is to “hack into” some of the low-cost security hardware on the market, employees will understand first-hand the perils that poor procurement choices can cause.

In the event that these purchases have already been made, it would be necessary to:

  • Assess risk through vulnerabilities. This can be done by an analysis of the product and the code, via a questionnaire sent to the manufacturer of the product and by a penetration test.
  • Mitigate the important risks identified.

There is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the Cloud. Here are the three benefits for moving to a hybrid-cloud or all-cloud system:

  • Easier access to system updates and patches – Vendors usually identify and correct vulnerabilities and bug fixes in software version updates. But updating software is time-consuming, and it’s a task that might fall through the cracks until something major happens. When using cloud services, the cloud service provider is responsible for the updates, which are immediately pushed down to you in a seamless or almost seamless way. This helps to ensure that your systems remain protected against known vulnerabilities.
  • Real time system health and availability status monitoring – Receiving an alert when a camera goes offline or when there’s a server failure could help avoid potential threats and the loss of critical “up” time. Cloud services can automate this task by providing real-time status dashboards accessible from anywhere and by sending an email or text with an alert that a system vulnerability has been identified. The administrator can then securely log into the system from any secure web server to investigate the issue and take corrective measures.
  • You can outsource risks and costs to providers – Keeping pace with threats requires expertise and capital. Cloud providers use economies of scale to enhance their solutions and provide high levels of security for their shared infrastructure. They take the burden of the risk of threats, investing money, time and resources to build and maintain highly-secure cloud platforms that benefit millions of customers. As a client, you get access to multiple layers of security at the fraction of the cost.
KEYWORDS: cyber risk management security budget security procurement security risk assessment security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mathieu Chevalier joined Genetec in 2010 as a software developer, and now plays a vital role in developing both internal and external cybersecurity protocols and strategies to assure the Genetec portfolio is “hardened” against cyber-attacks. Chevalier works closely with all Genetec product development teams to assure the latest cybersecurity measures are in place to protect the company’s software architecture, solutions, and features. Chevalier holds a Bachelor of Computer Engineering degree from the University of Sherbrooke, Québec.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • small-cyber-enews

    Small and Mid-Size Businesses Need to Focus on Cybersecurity

    See More
  • physical security

    A proactive approach to cyber and physical security

    See More
  • mitigating risk with third party software

    Hidden risks with third-party software and how to mitigate those risks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing