Latin America. The rapid evolution of access control technologies, in particular the shift from a closed system to an open IP-based architecture, has enabled a new set of possibilities for end users.
Modern access systems offer an open communications architecture, designed to enable the deployment of advanced equipment such as IoT devices. The benefits are clear; access control technology can be connected to other devices on a network and interact to develop effective solutions. That is why, this type of physical security technologies have had a rapid growth in recent years: with a minimum investment in solutions, companies can count on high intelligence.
A clear example is to closely integrate an access control solution with video surveillance technology. This helps verify that the person trying to access the facility is the one listed on an ID card. Beyond physical security, interaction with other systems, such as HR software, can help organizations detect potential intruders by identifying that the credentials of an employee who may be on vacation are being used to try to enter. But what is the real picture of the transition from physical technologies to IP-enabled access control solutions?
Preventing cyber attacks
The problem with adding any technology to an IT network is the likelihood of enabling an access point or backdoor to a company's sensitive data to criminals or other cyber threats, if it is not deployed correctly. That is why, as IoT technologies are increasingly used, cybersecurity has become a real challenge for companies. Really, a company's future could depend on its ability to protect personally identifiable information (PII) that is generated and stored in a device's database and access control system. With the General Data Protection Regulation (GDPR) coming into action next May, ensuring security policies are up to date has become a priority.
When technology, whether access control, physical security, or any other IP device, is connected to a network, cybersecurity risks are immediately increased. To cite one example, last year it was discovered that nearly 200,000 internet-connected security cameras could allow cybercriminals to control them remotely. Located on an IT network, they could also act as an entry point to other systems within a company, meaning that data protection policies become essential.
Ensuring cybersecurity
Securing any device that is on a network is vital to ensure data protection. Cybercriminals could not only access and steal data related to the system they infiltrate, but they could also access other IT systems within a company. A "safe by default" design scheme is essential for any technology used today. However, the cybersecurity element of a modern company is a process that extends beyond a product-driven approach.
True security requires collaboration between the user and the manufacturer: no device, despite being secure by default, will remain so with the default passwords unchanged, for example. Any company that wants to install devices connected via IP, be it access control, video surveillance, or audio systems, should also ensure that the manufacturer and vendor you work with prioritize cybersecurity. In short, if your processes, systems, and suppliers aren't secure, your business won't be either.
By John Allen, Business Development Manager - Access Control, Axis Communications
Leave your comment