Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

How to Work with IT on Physical Security Decision-Making

By Kim Loy
cloud-enews
June 11, 2018

The Internet of Things (IoT) is quickly becoming a household term; with the rise in cloud-based technology and increased connectivity of devices, there aren't many businesses left that haven't explored what the IoT offers and its many benefits to security systems. The advantage is quite simple: communication between devices increases efficiency and streamlines operations. Physical security systems that harness the cloud are also in demand, offering organizations the advantage of remotely managing security operations. 

But with this interconnectivity comes an enhanced risk of security threats. Cybersecurity can no longer be ignored as organizations continue to integrate physical security products; the possibility and severity of a data breach rises significantly as more devices are added to one universal network. As many leaders know, increased risk doesn’t automatically mean an increase in an organization's security budget or preparedness plans.

One solution to combating this expanding hazard involves repurposing a resource and expert pool often already available to an enterprise organization: the IT department. IT professionals are already well-versed in the ins and outs of a company's computers, network and software, and they share the common goal of protecting critical data and keeping outsiders out. 

There are several considerations to be made when involving the IT department in physical security decisions, including: 

 

Timing

When a company is building or updating their security solution, it's critical that the IT department is consulted at an early stage in the process, ensuring that the capital investment in security systems is conducive to the goals of the organization as a whole. 

 

Establishing Protocol

The IT department should be used to ensure proper data safety protocols are created when involving the use of physical security systems on a network, as well as policing whether these rules are being followed. A hack into an organization's private information can be catastrophic, and oftentimes intruders are looking for sensitive material relating to people's personal lives, such as Social Security numbers. Employing the help of an IT team can ensure such data is comprehensively secured.

 

Evaluating New Technology

IT departments can assist organizations in keeping up with new technology, such as software updates and patches, as well as emerging technology like the cloud. IT departments have the insight required to take precautions against running too much on an internal network and the ability to determine which systems might work best with existing technology.

 

Managing Data

IT acts as the bridge between departments like human resources and physical security as far as both employee records and employee access. It's important to consider the fact that these departments need to “talk” to each other – not just physically, but through technology, as well. IT can facilitate this when bringing the systems together to streamline operations.

 

Integrating Systems while Protecting Data

The integration of multiple aspects of a security network through a unified system is incredibly valuable, but also creates more points of vulnerability. Encrypting communications between devices is therefore paramount; a single insecure structure or poor deployment can make the entire system vulnerable. IT and security teams must work together to protect each facet of a connected network to guarantee that the overall system is secure.

 

A Proactive Strategy

Involving the IT department at an early stage in the selection of physical security systems sets the organization up for success by being more proactive than reactive in their approach to keeping people and assets safe. More specifically, implementing a cloud-based solution that allows security directors to remotely access and control their security systems can keep important events from being missed and security breaches from happening time and time again.

A strong relationship with IT professionals is invaluable when it comes to achieving the maximum safety possible of a security network. Keeping up with remote and instant access to security solutions must be weighed with the ability to keep data safe and secure from threats, and the expertise of an IT team can only strengthen the universal security of a business or enterprise organization.

KEYWORDS: cloud security cyber vulnerability data breach network security security device management video surveillance cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kim Loy, Director of Technology and Communications, Vanderbilt

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Laptop and notebook open on wood desk next to a coffee cup

    Inhibitors to good decision making

    See More
  • Security leaders can learn about decision making from poker

    What poker can teach security leaders about decision-making

    See More
  • Figure 1

    Using Environmental Risk Mapping and Analysis to Enable Effective Decision Making

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing