Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

How to Work with IT on Physical Security Decision-Making

By Kim Loy
cloud-enews
June 11, 2018

The Internet of Things (IoT) is quickly becoming a household term; with the rise in cloud-based technology and increased connectivity of devices, there aren't many businesses left that haven't explored what the IoT offers and its many benefits to security systems. The advantage is quite simple: communication between devices increases efficiency and streamlines operations. Physical security systems that harness the cloud are also in demand, offering organizations the advantage of remotely managing security operations. 

But with this interconnectivity comes an enhanced risk of security threats. Cybersecurity can no longer be ignored as organizations continue to integrate physical security products; the possibility and severity of a data breach rises significantly as more devices are added to one universal network. As many leaders know, increased risk doesn’t automatically mean an increase in an organization's security budget or preparedness plans.

One solution to combating this expanding hazard involves repurposing a resource and expert pool often already available to an enterprise organization: the IT department. IT professionals are already well-versed in the ins and outs of a company's computers, network and software, and they share the common goal of protecting critical data and keeping outsiders out. 

There are several considerations to be made when involving the IT department in physical security decisions, including: 

 

Timing

When a company is building or updating their security solution, it's critical that the IT department is consulted at an early stage in the process, ensuring that the capital investment in security systems is conducive to the goals of the organization as a whole. 

 

Establishing Protocol

The IT department should be used to ensure proper data safety protocols are created when involving the use of physical security systems on a network, as well as policing whether these rules are being followed. A hack into an organization's private information can be catastrophic, and oftentimes intruders are looking for sensitive material relating to people's personal lives, such as Social Security numbers. Employing the help of an IT team can ensure such data is comprehensively secured.

 

Evaluating New Technology

IT departments can assist organizations in keeping up with new technology, such as software updates and patches, as well as emerging technology like the cloud. IT departments have the insight required to take precautions against running too much on an internal network and the ability to determine which systems might work best with existing technology.

 

Managing Data

IT acts as the bridge between departments like human resources and physical security as far as both employee records and employee access. It's important to consider the fact that these departments need to “talk” to each other – not just physically, but through technology, as well. IT can facilitate this when bringing the systems together to streamline operations.

 

Integrating Systems while Protecting Data

The integration of multiple aspects of a security network through a unified system is incredibly valuable, but also creates more points of vulnerability. Encrypting communications between devices is therefore paramount; a single insecure structure or poor deployment can make the entire system vulnerable. IT and security teams must work together to protect each facet of a connected network to guarantee that the overall system is secure.

 

A Proactive Strategy

Involving the IT department at an early stage in the selection of physical security systems sets the organization up for success by being more proactive than reactive in their approach to keeping people and assets safe. More specifically, implementing a cloud-based solution that allows security directors to remotely access and control their security systems can keep important events from being missed and security breaches from happening time and time again.

A strong relationship with IT professionals is invaluable when it comes to achieving the maximum safety possible of a security network. Keeping up with remote and instant access to security solutions must be weighed with the ability to keep data safe and secure from threats, and the expertise of an IT team can only strengthen the universal security of a business or enterprise organization.

KEYWORDS: cloud security cyber vulnerability data breach network security security device management video surveillance cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kim Loy, Director of Technology and Communications, Vanderbilt

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Laptop and notebook open on wood desk next to a coffee cup

    Inhibitors to good decision making

    See More
  • Security leaders can learn about decision making from poker

    What poker can teach security leaders about decision-making

    See More
  • Figure 1

    Using Environmental Risk Mapping and Analysis to Enable Effective Decision Making

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing