Prepare for cyber-physical attacks

SMART Access & Identity 2024 Information Security, Access Control & Identity Management

As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity. As the threat of cyber-physical attacks grows in number and complexity, organisations worldwide will be forced to reconsider the preparedness of their cybersecurity and physical security systems.

In Gallagher’s Security Industry Trends Report1 released in December 2023, Gallagher Security Cyber Architect, Rob Cowsley says, “Cybersecurity and physical security are often inherently linked to one another; it is difficult to have a secure physical solution without considering elements of cybersecurity, and impossible to avoid physical components within a cyber-secure environment. It is becoming increasingly important for businesses to consider both to achieve a holistic security solution.”

To address the shifting needs of organisations and use feedback from its end users and channel partners, Gallagher continues its commitment to customer-centric manufacturing and innovation to address its customers’ current and emerging security needs.

In November 2023, Gallagher released the Controller 7000 (C7000). Designed to deliver stronger cyber protection, new capabilities, scalability, and functionality, the C7000 will help organisations fortify their protections in preparation for future unknown threats.

The C7000 has been developed with powerful cybersecurity functionality; only Gallagher-approved firmware can run on the device, software with known vulnerabilities is prevented from being installed, it is impossible to clone or counterfeit the device, critical cryptographic keys are stored securely; and security infrastructure generates, processes, and stores cryptographic keys and certificates, preventing supply chain attacks. Altogether, the C7000’s layers of baked-in cyber protections equip users with responsive and adaptable technology to safeguard against sophisticated cyber threats for many years to come.

“We hold our products to a higher standard by subjecting them to some of the most rigorous testing in the industry; employing a combination of in-house and third-party penetration testing and collaborating with everyone, from standards accrediting bodies, to hobbyist hackers to fortify our solutions against the threats of the future. As a result, our solutions meet the cybersecurity needs of both commercial entities and those operating in high security, like government bodies, militaries, and critical infrastructure sites,” says Cowsley.

Cybersecurity is not exclusively up to the manufacturer. End users also bear responsibility for maintaining their systems to protect against threats.

One major source of vulnerability is outdated hardware. As cyber risks evolve, out-of-support hardware that no longer receives security updates, or is unable to use the latest protections, leaves end users open to attacks that could have been prevented by an upgrade. Many hackers who find vulnerabilities are finding them in legacy hardware, further exposing the danger these parts pose to end users and the people, data, and assets they aim to protect.

Even running routine regular audits on systems can be an effective tool to safeguard against threats. Audits can reveal problems like blank passwords on highly privileged accounts, or tampering with door sensors, enabling end users to maintain their defences and safeguard against their own worst-case scenarios.

Maintaining cybersecurity can be a challenge, especially as the threat landscape evolves at such a rapid pace. Technologies with built-in cybersecurity reduce the burden of maintenance on users and help ensure systems remain up-to-date and fortified against threats. As Gallagher’s future growth and product roadmap develops, C7000 users will have the foundation in place to immediately benefit from new developments and features as they are released through streamlined updates. Users will have continuous value delivered over the lifespan of the controller, making the return on investment in cybersecurity and functionality worth it for many years to come.

“Cybersecurity is not a destination; it is a continuous journey, and only those prepared to evolve alongside the threat landscape will be able to take their customers on that journey with them,” concludes Cowsley.

[1] www.securitysa.com/*gallagher5


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.