Everything is connected
Physical security is no longer just a case of a high fence and security guards. Everything is interconnected and reliant on readily available information and visibility in order to maintain security installations.
All aspects of security are driven by information, and all of this is digital – so by not ensuring that you have the correct cyber-security programme in place all can be lost to a smart cyber-attack. Internet Protocol (IP) phones, cameras, access control are all connected to the Internet. Do you know how much of your footprint is visible to the outside world… and is it secured?
An important point to get out of the way is the ongoing mention of IT security. The name itself is incorrect; if we continue to focus on the words IT security, it means that this field sits purely within IT. This is not the case today. Cybersecurity cannot be done just by IT, it is a specialist field. You would not get an ice cream manufacturer to handle your physical security, so why ask an IT professional to manage your cybersecurity. Both could do the job, but would the outcome be desirable?
Cybersecurity threats are growing exponentially and this is because they are very difficult to trace with a far lower risk while still yielding very high returns.
We have seen many enterprises that have excellent physical perimeter security which includes access control systems, cameras and smart licence scanning at the gates. Access control systems contain sensitive and confidential information of all staff and contractors. These machines are usually attached to the network and accessible from the Internet to maintain a central database or report to HR. Another aspect is that sometimes these machines are not managed and therefore remain unpatched – or run an obsolete operating system such as Windows XP.
I have been told in several meetings that these access control machines are not very important because they just let people in and out, and the information is then used for payroll. This includes biometric data of all staff and visitors; the information that allows direct access into your property. Additionally, with this information a very focused and targeted social engineering or phishing attack on your staff could be launched. When you add personal information security requirements contained in legislation such as PoPIA, it is critical that all these systems are carefully managed and monitored.
Vulnerabilities in systems, especially those considered Internet of Things (IoT) devices, appear almost every day. Yet, most businesses do not even know that their CCTV control system should be updated or patched regularly – let alone what is accessible from the outside world. Many of these systems have direct Internet access and many installers never bother to change the default usernames and passwords. This is because cybersecurity is not thought of during the installation phase of these projects, and this step is then forgotten even after it is live.
A lack of cybersecurity visibility means that there is very easy access to all the information on your systems, including personal information, usernames and passwords. Open access to actual video feeds is also quite easily achieved through compromised or unsecured equipment. A simple Google search can give us access to thousands of camera feeds, images and login details from businesses all over the world.
The reality is that in today’s ever-evolving threat landscape, physical security is only one aspect of an overall requirement to secure businesses. Everything is hyper-connected and constant cybersecurity monitoring is critical – of computer networks and devices, but also the equipment used for physical security.
It is all well and good to have smart devices to scan a licence disc on entry, but without knowing that systems are secure and up to date you stand the risk of suffering a massive cyber breach. Reputational damage alone can destroy a business and lead to personal loss. An unsophisticated attack on a non-secured physical security environment can leapfrog onto other business systems, exposing confidential information, routes, customers, packages or even discount models – all of which can have a major impact on the business or be used to plan a heist or strike a ransomware attack.
The truth of the matter is that it is not only corporate servers and PCs which require cybersecurity monitoring and reporting, but this is also a massive requirement for security systems, cameras, IP phones and all other Internet connected equipment. Without visibility and monitoring you will never know where your cyber risks are.
- Hits: 382