Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security & Business ResilienceCybersecurity News

What to Consider When Developing a Cybersecurity Strategy

By Wayne Dorris
cyber-enews
July 30, 2019

In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach could be catastrophic.

Like any IP-based technology, physical security devices and systems can also be vulnerable to breaches, but there are a number of actions you can take to reduce that likelihood. One of the first steps is to develop a written cybersecurity strategy that can be used to ensure that all devices comply with company policy. With regard to the specifics of this policy, there are a number of factors that will come into play, such as compliance with industry and government regulations and standards, such as GDPR, ISO 27001, PCI and others. It is also important to ensure that physical security devices are aligned with standard risk-management tools and practices like the NIST Cybersecurity Framework.

When developing the cybersecurity strategy, the following five factors are key to ensuring that physical security and other devices provide strong protection to prevent network breaches.

 

Patching and Updating

Ensuring that device software patches and updates are applied consistently on an ongoing basis is one of the most effective strategies for maintaining cybersecurity. These updates address known and emerging vulnerabilities, but they often go uninstalled because it’s not clear who has responsibility for that function.

In creating a cybersecurity strategy, ownership of those actions must be clearly spelled out. The task may fall to a specific individual or department within your organization (physical security or IT, for example), or the integrator may take responsibility as part of an ongoing maintenance or warranty agreement. Without clearly defining roles, these vital tasks can easily fall through the cracks.

Regardless of who bears responsibility for patching and updating, having a test lab that is separated from the production network is key, provided that ownership of the lab and the testing process is clear.

 

Vulnerability Management

It’s likely that your IT department routinely scans devices connected to the network, which could number in the hundreds of thousands or millions, depending on the size of the organization. However, taking physical security devices at face value without context for what they do, why they do it and what security controls they employ, the settings and features of these solutions may appear to be at odds with general IT best practices and organizational cybersecurity policies.

For example, the UK recently passed “secure by default” legislation, which requires manufacturers to connect their devices via HTTPS. As a result, devices often ship with self-signed certificates, which will show up as red flags in IT scans. Therefore, it’s important to explain the necessity - and security - of these certificates to the IT department to avoid problems.

Another consideration is that device manufacturers’ firmware often uses other vendors’ code for network services, such as OpenSSL and Apache Web Server. Organizations need to understand that when they buy a product, they are dependent on those code vendors as well as the manufacturer. As a result, even though vulnerabilities identified by IT scans will be reported immediately, devices can’t be updated immediately because vendors have to work with those other providers to develop a patch and QA/test it. This requires discussions with your IT department to come up with short-term mitigations like limiting traffic (whitelisting)  until a patch is available.

 

Equipment Replacement

In the past, it may have been reasonable to expect to get seven to 10 years of use out of a surveillance camera, particularly analog models. While this may still be feasible, there can be a lot of liability around older models, which may no longer be supported by the manufacturer. Without the ability to take advantage of the latest cybersecurity patches or firmware updates, these cameras can be vulnerable to attack.

As a result, five to seven years at most is a more realistic timeframe for replacing IP cameras, but swapping out an entire surveillance ecosystem at once can be time-consuming, labor intensive and expensive, often prohibitively so. So rather than plan a full technology refresh, it’s best to plan to replace about one-fifth of cameras each year on an ongoing basis. This allows you to constantly cycle through to ensure cameras are protected by newer, more effective cybersecurity features with the added bonus of shifting costs from capital to operating expenses.

 

The Importance of Documentation

Many manufacturers publish a hardening guide to help support security professionals in securing devices against cyber threats. These documents provide a baseline configuration for dealing with the ever-evolving threat landscape, and the installer’s job is to match what’s contained in that documentation with an organization’s cybersecurity policy. Therefore, a solid, written cybersecurity policy is essential to ensuring physical security equipment and systems deliver the level of protection your organization requires.

Integrators who have this information at hand when deploying systems are also able to provide peace of mind in the form of written documentation that all devices and systems they’ve deployed are in compliance with policies.

 

Ensure Supply Chain Security

From a cybersecurity perspective, it’s important to know exactly where products are coming from and how vendors are securing their devices prior to shipping them to resellers and security professionals.

Many device manufacturers have taken steps to ensure that no one can use the supply chain as an attack vector. These include TPM (trusted platform module), signed firmware and secure boot features, preferably a combination of all three. A TPM chip stores encryption keys and certificates specific to the host system for hardware authentication. This encryption key is maintained within the chip and cannot be extracted. Secure boot takes the signed firmware checks the signed hash downloaded from the manufacturer. Once decrypted, there are signed hashes also in the boot sector of the firmware that are also checked. 

Using a product that offers secure boot ensures that no one has tampered with the code between manufacturing and deployment. In the unlikely event that someone alters the device firmware with malware the device simply won’t start up, because overall signed firmware hash and the hashes in the firmware are altered. In addition to protecting devices along the supply chain, this also helps mitigate potential insider threat once the device has been installed.

These five factors provide a strong framework for ensuring that hackers and others will not be able to use physical security devices as an entry point into overall networks and systems. Therefore, when developing a cybersecurity strategy, these considerations, combined with a written policy, should play a key role in maintaining overall protection, which is vital given the number and types of devices that are attached to the network.

 

KEYWORDS: cybersecurity data breach mobile devices

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Waynedorris
Wayne Dorris is Business Development Manager, Cybersecurity, Axis Communications, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-sec-freepik1170x658v98.jpg

    Key questions to ask when building a cloud security strategy

    See More
  • Hire a ransomware negotiator for your enteprise

    Consider these credentials when hiring a ransomware negotiator

    See More
  • video collaboration

    Effective video collaboration: What you need to consider before investing in a system

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!