Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementCybersecurity News

Access Control: Don’t Give Cybercriminals the Keys to Your Business

By Despina Stamatelos
Revised NIST Cyber Security Framework - Security Magazine
March 5, 2020

The use of IP-based access control solutions to manage employee comings and goings has dramatically increased in recent years. The Internet of Things (IoT) has added connectivity to an abundance of devices that better facilitate access which has users – and potential users – rightfully concerned about the security of these newer technologies.

Electronic access control, mobile and cloud solutions­—as well as the variety of hardware devices added to a network to facilitate access control (such as readers, controllers and electronic locks)—can make a solution vulnerable to cyber threats and cyberattacks, and potentially compromise an organization’s entire network. It’s essential when choosing an access control provider and solution, that the manufacturer and installer emphasize cybersecurity for the whole architecture, from the server down to the reader, above all else.

 

How Secure is Your Communication Protocol?

Many of the traditional access control systems use the Wiegand protocol for communication between the reader and controller. Because it is unsecure and unencrypted, Weigand leaves many systems vulnerable to attack. Despite using secured credentials, the sensitive info that is passed onto the controller can be tapped into over the Wiegand wire. A more cyber secure option is the Open Supervised Device Protocol (OSDP) which is the golden standard in the industry. OSDP is highly secured and encrypted making it harder for cyberattacks. It is also trusted by organizations needing the highest level of security. In fact, it meets the requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that guides how the access control industry does business with the federal government.

Using smartphones on a network-based access control solution might – and should – raise concerns about cybersecurity. Rumors continue to swirl that newer technologies like Bluetooth or Near Field Communication (NFC) are not secure. However, when properly set up and maintained, they are. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be like suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols and safeguards put in place.

 

Smart Cards are Secure – If You Choose the Right Card and Take the Right Precautions

As access control has progressed, we’ve learned that certain older technologies (like magstripe and proximity cards) can be inherently insecure. When choosing smart cards for your access control solution, always pick the latest generation with the most up-to-date technology. 

As alluded to earlier, your network is only as secure as the devices you attach to it. For access control, one of the most vulnerable cyberattack targets are traditional readers and controllers that facilitate your access control solution. Ensure they, too, are equipped with the latest in secure technology and that that technology is compatible with any smartcard you choose (because oftentimes they aren’t).

 

The Same Goes for Electronic Locks

Today, there are electronic locks that need no wiring and little more than an internet connection to facilitate access control. Sounds like the perfect storm for a cyberattack – and it can be – but reputable electronic lock manufacturers have been hard at work engineering important security protocols like encryption and authentication into these locks to help prevent malicious cyberattacks (and unauthorized access). When choosing hardware for your access control solution, only select those manufacturers that have committed to extending protection against cyberthreats all the way to the door.

 

Make Cybersecurity a Priority When Choosing an Access Control Solution

Use these tips when evaluating access control providers to ensure you are choosing a product that offers the best in cybersecurity protection:

  • Choose a vendor that takes cybersecurity seriously. Protection against cyberthreats includes end-to-end encrypted communications for software and hardware, secure claims-based authentication, and digital certificates. They should also conduct regular penetration tests to try and catch vulnerabilities on their own before they become a threat to end users, and ensure that the entire infrastructure is secure, from the server to the reader.
  • Privacy is important, too. Because access control credentials can contain private end user and confidential company data, a vendor that’s committed to privacy as well as cybersecurity should also commit to earning industry certifications (such as ISO 27001) and comply with legislations that are designed to protect privacy (such as GDPR, and the California Consumer Privacy Act).
  • Unification can result in total physical security system protection. A unified physical security platform is a comprehensive software solution that manages access control, intercom, intrusion, video, ALPR and analytics through a centralized open architecture built to provide complete access to all data in a single interface. With unified solutions, cybersecurity protections for all systems are monitored and maintained on a continuous basis. Health monitoring systems within unified solutions can catch and address issues before they become fully-fledged problems.
  • Choosing the right systems integrator is the best start. Systems integrators can recommend, design and install all components of a physical security solution. If you’ve chosen to deploy an access control system, be sure to ask about cybersecurity and how the system is protected against ongoing cyberthreats. There are even insurance policies offered to protect against the potentially devastating cost of a cyberattack offered through systems integrators who have demonstrated a commitment to protecting against cyberthreats and attacks.

Cyberattacks on businesses cost billions each year. One poorly secured access credential can give cybercriminals the keys to your business – literally. The best way to protect your business is to make cybersecurity a priority when choosing an access control system and remaining vigilant, and never become complacent about the security of your security.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control credentials cyber security cybersecurity Internet of Things (IoT)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Despina Stamatelos is Product Marketing Manager at Genetec, Inc. 

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Email icon

    Cybercriminals Attack VPS to Access Business Email Systems

    See More
  • customer service

    How to Evaluate Your Access Control Provider’s Customer Service

    See More
  • access card

    How to Protect Your Access Control System Against Cybercrime

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo. Learn how this dynamic public environment leverages cutting-edge security technologies to protect people, animals and assets.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing