Protecting the nerve centre

CCTV Handbook 2018 Surveillance, Information Security, Integrated Solutions

A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is attacked (or hijacked) in order to allow syndicates to attack their intended target, for example a mine or a cash centre. These attacks have happened to both on-site and remote control rooms, showing just how well informed and prepared the syndicates are.

However, a physical attack is one thing, in today’s digital world we are also likely to see cyber-attacks on control rooms in an effort to shut them down. The cyber approach doesn’t need people to actually be on site to carry out the attack. Of course the cyber-attack needs people and planning, but malware can be installed in the control room well ahead of time and activated quite easily on the required day.

So what is the security team supposed to do? Build another control room to monitor its control room? Have the entire control room backed up to another site in case the primary site goes down?

Drew van Vuuren.
Drew van Vuuren.

There are many options when it comes to protecting your control room. Hi-Tech Security Solutions asked Drew van Vuuren, ESET’s data protection officer, for some insights into the cyber and physical protection of control rooms – after all, these sites hold sensitive and personal information that you need to protect from unauthorised parties, which includes employees taking information home with them.

Where are the risks

Van Vuuren provides the following examples of how control rooms can be left vulnerable.

Vulnerabilities would extend to insufficient controls on access systems that are used to gain access to the key points within the control room. This includes things like doors left ajar as well as tailgating without authenticating your credentials on a physical access control reader. Additionally, doors, windows, etc. being left open by employees also contribute significantly to the likelihood that vulnerabilities would be introduced into the environment. A further consideration on physical vulnerabilities would be insufficient controls on the mitigation of flood, fire and other risks, with these controls having to be defined in business continuity and disaster recovery programmes.

To mitigate these risks, van Vuuren advises control room management uses “a combination of defined security control milestones, like scheduled checks as well as ensuring educating of staff and employees on the risks faced when allowing people to tailgate or leaving doors or windows open.”

If access to the control room is not managed by an authentication mechanism, then anyone would be free to enter and exit the control room as they wished. Use of biometrics, smartcard readers, as well as keypad codes etc. should be used to ensure access is strictly controlled. Failure of these systems would lead to a significant impact on security within the control room.

“To mitigate these risks, ensure redundancies exist in the systems that manage the authentication of logical access control systems by defining, implementing and managing them in business continuity and disaster recovery plans.”

Save the technology

It goes without saying that control rooms are expensive investments when considering the technology that is used in these nerve centres. To ensure a reliable service, these environments need backup or redundant technology to cater for normal problems such as wear-and-tear, electricity blackouts and human error. For example, they require redundancy in their power supplies and telecommunications channels, through to servers and desktops, video walls, etc.

In order to protect its investment, van Vuuren says an organisation needs to ensure it has considered the following, among others, physical and logical security solutions:

• Fire suppression and mitigation technologies: Sprinklers, CO2 filtering systems, air conditioners, flood defences by ensuring systems are isolated from water sources, and raising the equipment.

• Ensure networks, servers and desktops have security controls implemented for mitigation of cyber-attacks by implementing endpoint security, network security and lock down configurations for these systems.

Watch the people

Ask any security operator in almost any industry and you will find that the internal risk of employees working for syndicates, or simply trying to enrich themselves at the expense of others is a serious threat. No matter how low the percentage of these ‘risks’ is, it only takes one to create havoc.

Van Vuuren believes companies need to perform extensive background checks on any employees who will be responsible for accessing systems within a control room. “Additionally, ongoing education on the challenges of being co-coerced into working with criminals is a very important initiative within an organisation.

“Finally, ensure that employees are sufficiently compensated for their roles so that they are not tempted to work with outside parties against the organisation.”

Safety by distance

It may be tempting for some to consider having their control room hosted offsite in an attempt to address some of the risks of compromise, but will this pay off? It’s impossible to determine a standard in this regard. Van Vuuren says it is difficult to say specifically what is better for an organisation when it comes to placement of a control room. In reality, it is specific to each company and warrants a detailed investigation and discussion by each stakeholder within an organisation. He provides an example of some of the factors each organisation could consider:

Profile of the business. What does the business do?

Profile of business systems. What information does the company manage, handle etc.?

Response and resourcing requirements. Are onsite staff required to respond to issues in the short-term or are remote responsive resources acceptable to the organisation?

Location of the business. Are there environmental factors which would influence the location of control rooms?

Commercial model. Is it more commercially viable to outsource to an external service provider for a managed control room service?

At the end of the day, each organisation needs to make these decisions based on its own risk profile and the specific requirements it has of its control room and related security operations. It is also worth noting that control rooms are increasingly being used for managing more than security, which can have an even greater impact on the onsite or offsite decision. When it comes to selecting technology aimed at protecting the control room, there are four areas which van Vuuren says is the starting point for each organisation:

• Logical access control such as biometrics etc.

• Environmental control systems including fire detection and suppression.

• Redundant IT systems, i.e. backup systems for network, servers and clients.

• Information security solutions and controls to protect your network and endpoint.

For more information contact ESET-SA, +27 (0)21 659 2000, [email protected], www.eset.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.