Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Integrated Solutions

A proactive approach to cyber and physical security

Protecting physical security technology against cyber vulnerabilities requires a top-down approach.

By Mathieu Chevalier
physical security

NicoElNino / iStock / Getty Images Plus via Getty Images

January 9, 2023

In a recent survey conducted by Genetec, 36% of respondents globally said they were looking to invest in cybersecurity-related tools to improve their physical security environment in the next 12 months. In the physical security industry, where cybersecurity has not always been top of mind, the survey results demonstrate that respondents are starting to recognize the reality of cyber threats to physical security systems.

The usage of Internet of Things (IoT) devices has benefited organizations’ ability to improve security and monitor activities in large, distributed spaces. However, with the benefits of connectivity, accessibility, mobility and data sharing come the aforementioned cybersecurity risks. Devices such as video surveillance cameras, access control readers and alarm panels can provide an entry point to networks of large and small enterprises via their physical security systems.

Securing these devices is paramount, and new strategies for managing access to physical security devices are critical.


WHAT CAN COMPANIES DO TO MITIGATE CYBERSECURITY THREATS TO THEIR PHYSICAL SECURITY TECHNOLOGY?

Being proactive is the first line of defense. The first consideration for security leaders is looking at the physical security providers an organization uses to determine their level of cybersecurity.

There are several questions security leaders can use to help further identify whether or not service and product providers are taking necessary cybersecurity precautions. For example, are they certified by a third party? Are they SOC2 compliant? Are they ISO 27001 certified? Are they using IT security best practices?

Consider selecting a physical security provider who makes cybersecurity a priority as a top-down approach in all that they do. This will include dedicated cybersecurity teams or departments and partnerships with vendors who share the same level of commitment toward cybersecurity.

Certain cybersecurity measures are hard to implement at scale, for example, such as updating firmware or changing passwords. A company that is committed to cybersecurity can help an organization develop the right cybersecurity posture to scale.

Security leaders should vet their suppliers and partners of IoT devices to ensure they have the maturity and longevity to meet the organization’s cybersecurity needs both now and as the organization grows.

Although a physical security system could be threatened, there are many ways to further mitigate the risk of malicious attacks. Deciding on technologies and solutions requires companies to determine whether the solution is designed with security in mind and has built-in cybersecurity measures. When a product is designed, built, coded and tested with security by default, features such as authentication, authorization, encryption and privacy are built into the system. These measures also ensure only those with set privileges can access specified assets, data and applications.

Some security-by-design considerations include:

  • Authentication: The process of user authentication is the first level of identity management. This prevents data from getting into the wrong hands. Multi-factor authentication (MFA) validates the identity of the user so only approved users are able to access information.
  • Authorization: Authorization helps define the access rights of a person or entity. An organization’s administrator can define the rights of different individuals and configure more or less restrictive access privileges depending on their roles and the level of access they are trying to achieve.
  • Encryption: Encryption protects the confidentiality of a company’s data both in transit and when stored. When data is encrypted, it is rendered unusable unless accessed by authorized users. Encryption can’t be effective without authentication and therefore ensures organizations are sharing data with authorized users.
  • Privacy by Design: There doesn’t have to be a trade-off when it comes to maximizing privacy and security. Security solutions that offer privacy protection by design allow companies to have more control over their data to meet regulations and securely store that data. A physical security provider can help customers define who has access rights to sensitive video footage without hampering the details required to complete their investigations.

Another consideration that security leaders can take to minimize potential cyber vulnerabilities related to their physical security technology is by considering a hybrid or cloud approach.

Moving physical security to the cloud or using a hybrid approach can potentially further mitigate cybersecurity risks, as a number of modern cloud systems include layers of security designed not only to protect against malicious actors, but also human error. With less hardware and servers to maintain or install, there is less exposure to cybersecurity attacks.

Moving to the cloud can also help security leaders and their organizations share cybersecurity responsibility with the cloud provider. The providers who take advanced cybersecurity precautions often offer the possibility to streamline maintenance and updates — which is crucial to ensuring secure systems.

By using a hybrid or cloud solution, organizations can have access to the latest built-in cybersecurity features and updates, including privacy controls, strong user authentication and various system health monitoring tools. Frequent and automatic updates can help those physical security systems remain protected against security vulnerabilities and stay actively monitored to detect and defend against cyberattacks.

KEYWORDS: cyber security risk management security management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mathieu Chevalier joined Genetec in 2010 as a software developer, and now plays a vital role in developing both internal and external cybersecurity protocols and strategies to assure the Genetec portfolio is “hardened” against cyber-attacks. Chevalier works closely with all Genetec product development teams to assure the latest cybersecurity measures are in place to protect the company’s software architecture, solutions, and features. Chevalier holds a Bachelor of Computer Engineering degree from the University of Sherbrooke, Québec.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-enews

    How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

    See More
  • small-cyber-enews

    Small and Mid-Size Businesses Need to Focus on Cybersecurity

    See More
  • auditing-freepik1170x658v4.jpg

    Proactive auditing — a key component to an offensive cybersecurity approach

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing