How secure is your physical security system?

Genetec talks about ways to prevent a data breach or cyber attack in 2019Last year, we saw a further increase in the number and severity of cyber attacks. The damage done by the Marriott hotels and Cathay Pacific hacks is still being felt now.

Hacks like these have lead governments at every level, as well as private organizations, to take a much closer look at the security of their operations as a whole. Knowing where to focus, however, isn’t always easy.

Could your organization be at risk?

When thinking about your IP physical security system, you are probably pretty confident that you have everything you need. After all, you have security cameras and a video management system (VMS) in place. And you have doors equipped with access control doors that require credentials you’ve issued for people to get through. But have you asked if the system itself is secure? Have you thought about:

  • How your security data is protected?
  • What kind of information is contained within your security system and what can be done with that information?
  • How dangerous it would be if that information ended up in the wrong hands?

The answers to these questions can lead to varying degrees of introspection and self-assessment.

And it gets even more complicated when you add privacy issues to these concerns. But don’t worry. There are solutions.

How Genetec can help 

In the next few blog posts, we’re going to be taking a closer look at the security of physical security systems or the Security-of-Security, our initiative that focuses on securing all aspects of your IP physical security system, including communications, servers, and data.

Up next, we’re going to look at the vulnerability of your security data and at some of the ways hackers gain access to IP-based physical security systems.

Previous Article
3 reasons why it's never been easier to migrate to an IP access control system
3 reasons why it's never been easier to migrate to an IP access control system

Before recent innovations, moving from a legacy access control system to an IP-based system was expensive a...

Next Article
Two-sided take on casino surveillance with Security Center
Two-sided take on casino surveillance with Security Center

Casinos and gaming establishments have tricky environments to secure. These facilities are usually open to ...