Out with the old, in with the new

March 2017 Retail (Industry), Access Control & Identity Management

As a keen observer of what different retail stores use for access control to the back-office, it always amuses me that the dominant technology in use here is a normal keypad where everyone uses the same password.

This very vulnerable technology is used almost in all retail stores as a means of keeping the general public out of the administration offices at the back of the store. On a few occasions, I have seen the password an employee uses to open the door, and then used it myself to prove to the stores that they are not using this type of technology safely. There is no operations log that can be checked if an incident occurs, to see who opened the door in that particular time, so no one can be held responsible.

The reason why the owners or planners of retail shops always opt for this low-end technology is a mystery, but it can be one of the following reasons:

• The retail shops use what they get from the shopfitting companies.

• Aesthetics is more important than security.

• Lack of security audits by the security managers of the retail groups.

• Lack of education of the security managers that have to do the audits.

• Cost might be a factor, but I don’t think this should be, if the door is protecting people.

My opinion is that people might be staying with what they are comfortable with, despite the fact of biometric systems becoming much more cost-effective and close to the cost of a normal keypad terminal. As with any other technology, biometrics becomes more advanced and cheaper every day.

Some biometric systems even have duress functions built in, so if someone does ask you to open the door under duress, you can use your allocated duress finger to open the door and at the same time create a silent alarm or notification to a central control room. The benefits of using biometrics at these vulnerable entrances makes sense, every time.

The retail industry must make the effort to attend security events and exhibitions, like Securex and other security roadshows, to see what is available, and to educate themselves on what the best strategy is to secure the back-office door.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.