Protecting the nerve centre

CCTV Handbook 2018 Surveillance, Information Security, Integrated Solutions

A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is attacked (or hijacked) in order to allow syndicates to attack their intended target, for example a mine or a cash centre. These attacks have happened to both on-site and remote control rooms, showing just how well informed and prepared the syndicates are.

However, a physical attack is one thing, in today’s digital world we are also likely to see cyber-attacks on control rooms in an effort to shut them down. The cyber approach doesn’t need people to actually be on site to carry out the attack. Of course the cyber-attack needs people and planning, but malware can be installed in the control room well ahead of time and activated quite easily on the required day.

So what is the security team supposed to do? Build another control room to monitor its control room? Have the entire control room backed up to another site in case the primary site goes down?

Drew van Vuuren.
Drew van Vuuren.

There are many options when it comes to protecting your control room. Hi-Tech Security Solutions asked Drew van Vuuren, ESET’s data protection officer, for some insights into the cyber and physical protection of control rooms – after all, these sites hold sensitive and personal information that you need to protect from unauthorised parties, which includes employees taking information home with them.

Where are the risks

Van Vuuren provides the following examples of how control rooms can be left vulnerable.

Vulnerabilities would extend to insufficient controls on access systems that are used to gain access to the key points within the control room. This includes things like doors left ajar as well as tailgating without authenticating your credentials on a physical access control reader. Additionally, doors, windows, etc. being left open by employees also contribute significantly to the likelihood that vulnerabilities would be introduced into the environment. A further consideration on physical vulnerabilities would be insufficient controls on the mitigation of flood, fire and other risks, with these controls having to be defined in business continuity and disaster recovery programmes.

To mitigate these risks, van Vuuren advises control room management uses “a combination of defined security control milestones, like scheduled checks as well as ensuring educating of staff and employees on the risks faced when allowing people to tailgate or leaving doors or windows open.”

If access to the control room is not managed by an authentication mechanism, then anyone would be free to enter and exit the control room as they wished. Use of biometrics, smartcard readers, as well as keypad codes etc. should be used to ensure access is strictly controlled. Failure of these systems would lead to a significant impact on security within the control room.

“To mitigate these risks, ensure redundancies exist in the systems that manage the authentication of logical access control systems by defining, implementing and managing them in business continuity and disaster recovery plans.”

Save the technology

It goes without saying that control rooms are expensive investments when considering the technology that is used in these nerve centres. To ensure a reliable service, these environments need backup or redundant technology to cater for normal problems such as wear-and-tear, electricity blackouts and human error. For example, they require redundancy in their power supplies and telecommunications channels, through to servers and desktops, video walls, etc.

In order to protect its investment, van Vuuren says an organisation needs to ensure it has considered the following, among others, physical and logical security solutions:

• Fire suppression and mitigation technologies: Sprinklers, CO2 filtering systems, air conditioners, flood defences by ensuring systems are isolated from water sources, and raising the equipment.

• Ensure networks, servers and desktops have security controls implemented for mitigation of cyber-attacks by implementing endpoint security, network security and lock down configurations for these systems.

Watch the people

Ask any security operator in almost any industry and you will find that the internal risk of employees working for syndicates, or simply trying to enrich themselves at the expense of others is a serious threat. No matter how low the percentage of these ‘risks’ is, it only takes one to create havoc.

Van Vuuren believes companies need to perform extensive background checks on any employees who will be responsible for accessing systems within a control room. “Additionally, ongoing education on the challenges of being co-coerced into working with criminals is a very important initiative within an organisation.

“Finally, ensure that employees are sufficiently compensated for their roles so that they are not tempted to work with outside parties against the organisation.”

Safety by distance

It may be tempting for some to consider having their control room hosted offsite in an attempt to address some of the risks of compromise, but will this pay off? It’s impossible to determine a standard in this regard. Van Vuuren says it is difficult to say specifically what is better for an organisation when it comes to placement of a control room. In reality, it is specific to each company and warrants a detailed investigation and discussion by each stakeholder within an organisation. He provides an example of some of the factors each organisation could consider:

Profile of the business. What does the business do?

Profile of business systems. What information does the company manage, handle etc.?

Response and resourcing requirements. Are onsite staff required to respond to issues in the short-term or are remote responsive resources acceptable to the organisation?

Location of the business. Are there environmental factors which would influence the location of control rooms?

Commercial model. Is it more commercially viable to outsource to an external service provider for a managed control room service?

At the end of the day, each organisation needs to make these decisions based on its own risk profile and the specific requirements it has of its control room and related security operations. It is also worth noting that control rooms are increasingly being used for managing more than security, which can have an even greater impact on the onsite or offsite decision. When it comes to selecting technology aimed at protecting the control room, there are four areas which van Vuuren says is the starting point for each organisation:

• Logical access control such as biometrics etc.

• Environmental control systems including fire detection and suppression.

• Redundant IT systems, i.e. backup systems for network, servers and clients.

• Information security solutions and controls to protect your network and endpoint.

For more information contact ESET-SA, +27 (0)21 659 2000, info@eset.co.za, www.eset.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.