classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Everything is connected
March 2018, Cyber Security, Security Services & Risk Management

Physical security is no longer just a case of a high fence and security guards. Everything is interconnected and reliant on readily available information and visibility in order to maintain security installations.

 John Mc Loughlin.
John Mc Loughlin.

Most businesses have access control systems that are connected to a computer, which often sits outside of the rest of the network. This is part of a bigger network of CCTV, proximity sensors and similar technologies along with the high fences and security guards acting as physical patrols.

All aspects of security are driven by information, and all of this is digital – so by not ensuring that you have the correct cyber-security programme in place all can be lost to a smart cyber-attack. Internet Protocol (IP) phones, cameras, access control are all connected to the Internet. Do you know how much of your footprint is visible to the outside world… and is it secured?

An important point to get out of the way is the ongoing mention of IT security. The name itself is incorrect; if we continue to focus on the words IT security, it means that this field sits purely within IT. This is not the case today. Cybersecurity cannot be done just by IT, it is a specialist field. You would not get an ice cream manufacturer to handle your physical security, so why ask an IT professional to manage your cybersecurity. Both could do the job, but would the outcome be desirable?

Cybersecurity threats are growing exponentially and this is because they are very difficult to trace with a far lower risk while still yielding very high returns.

We have seen many enterprises that have excellent physical perimeter security which includes access control systems, cameras and smart licence scanning at the gates. Access control systems contain sensitive and confidential information of all staff and contractors. These machines are usually attached to the network and accessible from the Internet to maintain a central database or report to HR. Another aspect is that sometimes these machines are not managed and therefore remain unpatched – or run an obsolete operating system such as Windows XP.

I have been told in several meetings that these access control machines are not very important because they just let people in and out, and the information is then used for payroll. This includes biometric data of all staff and visitors; the information that allows direct access into your property. Additionally, with this information a very focused and targeted social engineering or phishing attack on your staff could be launched. When you add personal information security requirements contained in legislation such as PoPIA, it is critical that all these systems are carefully managed and monitored.

Vulnerabilities in systems, especially those considered Internet of Things (IoT) devices, appear almost every day. Yet, most businesses do not even know that their CCTV control system should be updated or patched regularly – let alone what is accessible from the outside world. Many of these systems have direct Internet access and many installers never bother to change the default usernames and passwords. This is because cybersecurity is not thought of during the installation phase of these projects, and this step is then forgotten even after it is live.

A lack of cybersecurity visibility means that there is very easy access to all the information on your systems, including personal information, usernames and passwords. Open access to actual video feeds is also quite easily achieved through compromised or unsecured equipment. A simple Google search can give us access to thousands of camera feeds, images and login details from businesses all over the world.

The reality is that in today’s ever-evolving threat landscape, physical security is only one aspect of an overall requirement to secure businesses. Everything is hyper-connected and constant cybersecurity monitoring is critical – of computer networks and devices, but also the equipment used for physical security.

It is all well and good to have smart devices to scan a licence disc on entry, but without knowing that systems are secure and up to date you stand the risk of suffering a massive cyber breach. Reputational damage alone can destroy a business and lead to personal loss. An unsophisticated attack on a non-secured physical security environment can leapfrog onto other business systems, exposing confidential information, routes, customers, packages or even discount models – all of which can have a major impact on the business or be used to plan a heist or strike a ransomware attack.

The truth of the matter is that it is not only corporate servers and PCs which require cybersecurity monitoring and reporting, but this is also a massive requirement for security systems, cameras, IP phones and all other Internet connected equipment. Without visibility and monitoring you will never know where your cyber risks are.

For more information contact J2 Software, +27 (0)87 238 1870,,

Supplied By: J2 Software
Tel: 087 238 1870
Fax: 086 619 3563
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Cyber-securing physical security
    March 2018, AVeS Cyber Security, This Week's Editor's Pick, Cyber Security
    You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.
  • Keep your guard up
    March 2018, This Week's Editor's Pick, Security Services & Risk Management, Training & Education
    The crux of a successful human guarding element is careful selection of the ‘right’ personnel and competence through appropriate and adequate training.
  • Cash crimes escalate
    March 2018, Fidelity Security Group, Cash Connect, This Week's Editor's Pick, Security Services & Risk Management, Retail (Industry)
    To get an idea of what is happening in the CIT industry in South Africa, Hi-Tech Security Solutions asked two companies for their take on the situation.
  • ContinuityMauritius opens new facility
    March 2018, ContinuitySA, News, Security Services & Risk Management
    ContinuityMauritius has been delivering business continuity services to the island of Mauritius for the past decade and has announced the inauguration of new improved and larger recovery facilities.
  • Cloudy with compliance
    March 2018, IT infrastructure, Security Services & Risk Management
    Companies increasingly turning to cloud for improved security, efficiency and regulatory compliance.
  • Secured access control
    March 2018, Suprema, Cyber Security, Access Control & Identity Management
    With the advances over the years in physical security products, these too have become open to cyber threats resulting in monetary and safety risks.
  • Can you secure security?
    March 2018, Graphic Image Technologies, Cyber Security, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Is it possible to protect physical security systems from cyber intruders? Laurence Smith looks at the task of securing physical security.
  • Cyber risks are business risks
    March 2018, Cyber Security
    It is only when IT security-related risks are considered as business risks that the relevance of addressing them with proactive, strategic and appropriate solutions really becomes apparent.
  • The reality of integrating physical and cyber
    March 2018, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Meshing technology with physical security can vastly improve the overall security landscape for any organisation.
  • Improved bulk cash handling
    March 2018, Cash Connect, This Week's Editor's Pick, Security Services & Risk Management, Products
    Cash Connect has launched a new self-service bulk deposit acceptor device, or ATM, for retail distribution centres.
  • What lies ahead in 2018?
    February 2018, Axis Communications SA, Cathexis Technologies, Forbatt SA, Milestone Systems, neaMetrics, Suprema, ZKTeco, G4S South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
    To find out what the physical security industry is expecting in 2018, Hi-Tech Security Solutions asked a few of the leading players what they expect in 2018 in South and southern Africa.
  • Cybersecurity trends 2018
    February 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Cybersecurity will remain a key issue for everyone in every industry this year. Here’s what some experts on the topic have to say.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.