What we know about the Security of our Security

As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

With greater connectivity over the web and multi-organizational access to physical security systems, we are experiencing an increase in the number of attack surfaces that could potentially leave people, data, individual privacy, and assets vulnerable.

In fact, 2016 saw even more stories about cyber-attacks, ranging from strangers hacking into baby monitors, to emails being hacked at the FBI and Department of Homeland Security.

And we know that, without proper protection, the size, scope, and severity of these types of attacks will likely increase over time. But it’s not all doom and gloom and as we have seen in this series, there are solutions. Both data and system protection mechanisms are available right now, and they are becoming stronger as our industry continues to innovate.

The tools we have  

The post What is encryption and how important is it?  examined how encryption works and the role it plays in keeping data—including security data—from being deciphered by unauthorized users.

Then, in How does authentication work? we discussed how tokens and certificates are used, often in addition to username/password combinations, to ensure that an entity—user, server, or client app—accessing your system is who it claims to be.

And A closer look at authorization looked at how system administrators employ a variety of authorization mechanisms to define user access rights and set up their privileges, thereby helping to ensure individual privacy.

As we look to the future, there is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the Cloud.

In addition, the IoT will play an even greater role in all our daily lives. We must be prepared for the technological changes and advancements that lie ahead, and we must work to ensure that our organizations, communities, and citizens remain safe.

To read the entire 6-part Security-of-Security blog series, start here. For information on securing your Genetec unified security platform, read A guide to hardening your Security Center system.

Previous Article
Are your cameras secured?
Are your cameras secured?

Learn about potential vulnerabilities and how to mitigate your risk.

Next Article
Why retailers should consider unifying POS and surveillance
Why retailers should consider unifying POS and surveillance

Using video technology to influence loss metrics at a point of sale (POS) is not a new concept for loss pre...


Speak with a Genetec expert

First Name
I understand and agree to the privacy policy.
Your request has been received!
Error - something went wrong!