Why security integration is important

Issue 9 2020 Cyber Security

When we talk about enterprise security, it can only mean two things: logical (network/cyber) security and physical access control. While physical security, consisting of alarms, access control and CCTV has been in place for over two decades, network security is a relatively recent phenomenon.

Cybersecurity is mainly concerned with viruses, malware, and IP theft. However, network and physical security were never independent. The merging of both has been mentioned for many years, but the implementation is quite complex for many enterprises.

For this reason, they are still treated as siloes, and convergence remains long overdue.

The following are eight reasons why unifying physical and network security is crucial:

1. The explosion of IoT

Physical security assets such as control panels, readers, alarms, and security cameras are now connected to the Internet, thanks to the advancements in IoT. However, it also makes them vulnerable to attacks.

A decade ago, it would be hard to imagine that HVAC systems could also pose a significant risk to an organisation's safety. However, this happened in 2014 when hackers exploited a peculiar defect in Target's HVAC systems and stole the personal data of nearly 40 million customers.

This is an example of how physical security assets are threatened due to lapses in network security. However, the concern is not limited to just cyber-attacks.

The scenario can be the exact opposite, where a highly secured network is left unprotected due to lapses in physical security.


Adrienne Campbell.

2. Threats to physical systems

Instead of penetrating network security, the attacker could decide to leverage the gaps in physical security. By doing so, they can gain access to building control operations such as the energy grid, video surveillance cameras and smart locks.

In that case, no level of cybersecurity can stop the attacker from entering the facility and walking out with the server. For this reason, the premises must be as secure as the network – something that is feasible with integration.

Think about this: as soon as an intrusion alarm goes off, the server room locks itself. Such robust physical security, combined with powerful cybersecurity, can protect servers on both fronts.

3. The need for centralisation

Visibility has been a big issue with connected devices. It is because most of the organisations don't have a centralised location to control IoT devices. Instead, these devices are connected across distant locations, such as a remote office, supplier's truck or a wind turbine. What complicates the matter is that many IoT devices are not manufactured with security in mind.

Hence, organisations not only need to centralise control, but also ensure that their connected devices are secure.

4. Coordination between OT and IT

Operational technology (OT) and IT don't operate in siloes anymore. We have observed that most organisations have separate departments for both. This needs to change. The integration should start with coordination between OT and IT teams.

Everything, right from industrial systems and manufacturing plants to mobile devices and smart cameras, is on the same network. Therefore, it makes sense that both IT and OT teams should be on the same page as well.

To achieve that, CIOs (chief information officers) and other senior executives should establish a security command centre where physical and cybersecurity teams can work together.


5. The affordability of technology

‘Smart’ tools, as we call them, are becoming cheaper and smaller. The affordability of technology leads to broader utility and availability. It also creates a frightening situation since malicious third parties no longer need a huge budget or sophisticated systems to hack into enterprise security.

Several sensor technologies, including pressure, smoke, temperature, optical, image, infrared and proximity sensors are blurring the line between digital and physical security as well.

For instance, setting the office temperature is now as simple as changing controls on a smartphone app. It is not something that security experts usually consider as risky or undefended. However, what happened in Target's case clearly establishes that these low-risk, automated systems need to be taken into account as well.

6. The proliferation of cloud-based platforms

Businesses are increasingly moving from on-premise IT infrastructure to cloud-based platforms. There are several reasons for doing this. Maintenance is no longer an issue since most of the updates occur via the cloud. Besides, vendors offer annual and monthly subscription plans which are budget-friendly for startups.

That said, cloud-based platforms are also supported by hardware (however minimal) within the facility. Only authorised personnel must get access to the system. Moreover, the emergence of cloud-based enterprise applications underlines the significance of IoT cybersecurity.

7. The efficiency of operations

The whole purpose of merging physical and network security is to enhance the efficiency of operations. We all know that physical security systems have been upgraded owing to smart features such as two-factor authentication. In addition, biometric scanning is generally used to secure physical access.

A live feed can be sent via the cloud to generate alerts when an intruder is detected by adding a motion-activated camera. Therefore, the unification of physical and network security stands to offer better protection to organisations.

8. Internal vulnerabilities

Without question, employees are an organisation's first line of defence. Traditionally, they have to manage multiple credentials to access their workspace and computers. Weak passwords can also pose a security risk for enterprises. It's common for IT help desks to receive multiple calls due to employees forgetting their credentials.

An integrated system can solve this problem. Besides, it's easier to train new employees on using a single interface to access both their workspace and computers.

The bottom line

Technological advancements present new security challenges to businesses. The role of a cloud services vendor, cybersecurity expert, IT security manager, and CIO is increasingly becoming tangled. In fact, new security roles such as IoT cybersecurity experts may arise in the future when the binary distinction becomes virtually impossible.

Organisations may still choose to hire different personnel to manage both components of security – physical and network. What matters is that each person assumes the greater responsibility of tightening the security of the organisation by integrating both components.

Adrienne Campbell is a security consultant and holds a Bachelor of Science degree in cyber/computer forensics and counterterrorism from the University of Illinois, Chicago. Hacking is one of the most misunderstood areas of modern life and she helps audiences that are interested in technology, coding and other fields to understand that hacking is something that can be addressed. You can find Adrienne at https://adrienne-campbell.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2022 Cloud Security Report
Cyber Security IT infrastructure
The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organisations are responding to security threats in the cloud, and the challenges they are facing.

Read more...
Arcserve launches N Series appliances
IT infrastructure Cyber Security
Arcserve introduces N Series appliances offering enterprise-level integrated data protection, recovery and cybersecurity to allow customers to simplify their IT environments and secure data.

Read more...
Securing business information more important than ever
Cyber Security Products
SMBs need to operate safely within the physical and virtual boundaries created by work-from-home business practices, as well as in-office operations.

Read more...
Storage is essential for a comprehensive cybersecurity strategy
Integrated Solutions Cyber Security
Cyber resilience is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Read more...
Malicious file protection for mobile devices
Cyber Security
The new version of Check Point Harmony Mobile, a mobile threat solution, can now block the download of malicious files to mobile devices, preventing file-based cyberattacks on organisations.

Read more...
Turnkey data loss prevention solution
IT infrastructure Cyber Security Products
Acronis’s expertise in data protection and the managed service provider market yields an innovative, fast-track approach for the prevention of catastrophic data leaks.

Read more...
The cybersecurity consolidation conundrum
Editor's Choice Cyber Security Healthcare (Industry)
Check Point discusses why less is sometimes more when it comes to securing your organisation from the innumerable cyberattacks happening every day.

Read more...
Companies continue to pay multiple ransom demands
News Cyber Security
Study reveals that 80% of companies that paid a ransom demand were hit again, nearly 50% reported paying a second ransom and nearly 10% paid a third time.

Read more...
DCC becomes sole Symantec distributor for South Africa
News Cyber Security
Drive Control Corporation (DCC) has been appointed the sole distributor for Symantec security solutions to the South Africa channel, and will now also be distributing Symantec into the SADC region.

Read more...
The evolution of vulnerability management
Cyber Security
As organisations focus on digitally transforming their enterprises, cybersecurity professionals have been facing an expansion of their attack surface – compounded by the digital explosion during the pandemic.

Read more...