Convergence of cyber and physical security

Issue 4 2023 Integrated Solutions, Security Services & Risk Management


Richard Frost.

With South Africa being the sixth most targeted country worldwide regarding cyberattacks, it’s no surprise that organisations have to put numerous steps in place to protect their networks and data. This is all the more crucial in a world where we have legislation such as GDPR and PoPI that dictate how people’s data can be stored, used and transmitted, with harsh financial penalties for those found in contravention.

More companies are investing in network and data security solutions and are being proactive in preventing breaches by carrying out active threat hunting, while there’s also a growing effort to separate information technology from operational technology as an additional security measure.

With more investment into network and endpoint security, these threat actors are now turning to tactics such as phishing and spear-phishing in order to get malware onto an organisation’s network. With employees more likely to be the weakest link in an organisation, the human firewall element has to be a key consideration, and cybersecurity awareness and training have to be carried out regularly.

Remote and hybrid working bring with them additional security challenges for organisations; while employees might receive cybersecurity training and practise safer online behaviour, the same might not be said for children or elderly members of the family who are sharing a Wi-Fi connection and could potentially compromise all devices on the network. The security situation is worse if an employee connects from a public Wi-Fi connection. Here, endpoint detection and response become key.

Cyber and physical focus

Employees will also have to be mindful of more than just digital security breaches, but also physical security issues. As an example, improperly discarded documents that contain personal, financial and other sensitive information can be used to build a profile against someone as part of a spear-phishing attack. Or think of having confidential documents that stay displayed on a screen or are printed out and laid on a table for anyone to see. Employees will have to be cognisant of how they are storing and discarding information at home too.

New challenges also loom on the horizon for businesses. With larger organisations being able to protect themselves better, hackers are targeting third parties who might be smaller suppliers, business partners or even clients. The majority of large security breaches that occurred last year were due to a smaller company first being breached in order to ultimately gain access to a larger organisation. We are also seeing how artificial intelligence (AI) can be a double-edged sword with tools such as ChatGPT being used by hackers to create malware.

Integrated security management

With threat actors always looking at new ways to breach corporate defences, organisations will have to respond with an ongoing investment in their security, both through the deployment of relevant products or solutions, and the continuous training of employees. However, while organisations might be doing more to be better protected against cyberattacks, what happens if someone breaks into their offices and then walks out with their PCs and servers?

We have already seen the overlap between cybersecurity and physical security when it comes to ensuring employees take better care of confidential corporate information. Going forward, the overlap will necessitate the integration of cybersecurity and physical security in order to enable the sharing of events to the same security operations centre (SOC).

For more information, contact Richard Frost, Armata, [email protected], www.armata.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.