The reality of integrating physical and cyber

March 2018 Editor's Choice, Information Security, Security Services & Risk Management

Security is undoubtedly a primary focus for any organisation, particularly in this digital age where assets extend beyond the physical to include virtual assets such as data. The emergence of cloud or Internet-based devices, such as smart meters and smart CCTV cameras, is expanding the reach of traditional security measures and enabling a host of heretofore unknown benefits.

Sanjay Vaid.
Sanjay Vaid.

For most industries traditional security mechanisms such as perimeter and access control are still of vital importance. Technology has, however, introduced new ways for these to be managed and automated. These technologies are yielding faster response times and improved security. Meshing technology with physical security can vastly improve the overall security landscape for any organisation.

Introducing Internet of Things (IoT) devices into an operational environment aids the reduction of many health and safety risks. These can range from smart cameras for surveillance, to sensors implanted on vehicles which track and trace progress, prevent breakdowns and enable pre-emptive maintenance. For example, sensors can quickly identify gas leaks, enabling quick resolution. Another example would be IoT-enabled construction equipment, which help avoid collisions or load-related accidents. Technology is making the industry safer.

There is a flip side to this however, as advanced technology also introduces a number of threats into security environments. Operations of organisations in entirety can be brought down by cyber-attacks, launched on a seemingly innocuous piece of technology such as a sensor or smart device.

Recently, a casino in Las Vegas was infiltrated via its fish tank, albeit a very high-tech fish tank connected to a wireless access point – the intent being to steal data. Fortunately, technology also came to the rescue in this case, as the systems were closely monitored and the hackers could be stopped before too much damage was done. Another recent attack saw an entire critical infrastructure plant’s operations being shut down due to hackers accessing and taking control of an Internet enabled workstation.

The likes of these attacks highlight how effectively cyber criminals can damage or cripple an entire business in a matter of minutes. In certain industries where health and safety is of paramount import – such as mining, oil and gas, engineering and health – the derailing of infrastructure and the halting of operations can cause more than simply financial or reputation damage – there are lives at stake.

A challenge facing industries such as those involving chemical plants, mines and oil and gas organisations, is that technology can also introduce physical threats. Wi-Fi, for example, can cause a fire hazard in environments sensitive to sparking. In such cases, organisations need to investigate alternative, environmentally suitable technologies to bring these sites onto their cybersecurity network, and maintain central surveillance, access control and identity management.

Access, both physical and network, is the area that businesses need to closely monitor and secure. Physical access is critical and ensures only the right people gain entry to the right areas of a business at any given time. Technology is allowing businesses to apply the likes of biometrics to manage access enabling quicker, more accurate access control.

From a virtual access and data security point of view, it is critical that organisations implement proper identity controls such as authentication and passwords, as well as multiple layers of encryption across their data-at-rest and data-in-motion.

Integration and centralisation is critical in order to properly manage and monitor all of these technology-backed security measures. Businesses need to ensure that the security technology they invest in, from physical to cyber, is capable of integrating with a central management platform from which they can efficiently and effectively control their entire security environment.

It’s also important to have the right security policies and processes in place, so that organisations are able to follow proper protocol in times of breach, or when a risk is identified. This is especially important as new regulations emerge, such as the Protection of Personal Information (PoPI) Act and the General Data Protection Regulation (GDPR). Such regulations will be pivotal when redefining data security policies and are likely to have a larger impact on sectors such as the financial, retail, and insurance sectors.

Budget and security concerns are likely to come up against each other, as businesses weigh risk against costs. Costs, however, will be in line with the risks, which inevitably vary across different industries. For many organisations where it is less critical for security to be wholly controlled within the business, opting for security-as-a-service will be a win-win answer to the risk vs cost debate.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.