Prepare for cyber-physical attacks

SMART Access & Identity 2024 Information Security, Access Control & Identity Management

As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity. As the threat of cyber-physical attacks grows in number and complexity, organisations worldwide will be forced to reconsider the preparedness of their cybersecurity and physical security systems.

In Gallagher’s Security Industry Trends Report1 released in December 2023, Gallagher Security Cyber Architect, Rob Cowsley says, “Cybersecurity and physical security are often inherently linked to one another; it is difficult to have a secure physical solution without considering elements of cybersecurity, and impossible to avoid physical components within a cyber-secure environment. It is becoming increasingly important for businesses to consider both to achieve a holistic security solution.”

To address the shifting needs of organisations and use feedback from its end users and channel partners, Gallagher continues its commitment to customer-centric manufacturing and innovation to address its customers’ current and emerging security needs.

In November 2023, Gallagher released the Controller 7000 (C7000). Designed to deliver stronger cyber protection, new capabilities, scalability, and functionality, the C7000 will help organisations fortify their protections in preparation for future unknown threats.

The C7000 has been developed with powerful cybersecurity functionality; only Gallagher-approved firmware can run on the device, software with known vulnerabilities is prevented from being installed, it is impossible to clone or counterfeit the device, critical cryptographic keys are stored securely; and security infrastructure generates, processes, and stores cryptographic keys and certificates, preventing supply chain attacks. Altogether, the C7000’s layers of baked-in cyber protections equip users with responsive and adaptable technology to safeguard against sophisticated cyber threats for many years to come.

“We hold our products to a higher standard by subjecting them to some of the most rigorous testing in the industry; employing a combination of in-house and third-party penetration testing and collaborating with everyone, from standards accrediting bodies, to hobbyist hackers to fortify our solutions against the threats of the future. As a result, our solutions meet the cybersecurity needs of both commercial entities and those operating in high security, like government bodies, militaries, and critical infrastructure sites,” says Cowsley.

Cybersecurity is not exclusively up to the manufacturer. End users also bear responsibility for maintaining their systems to protect against threats.

One major source of vulnerability is outdated hardware. As cyber risks evolve, out-of-support hardware that no longer receives security updates, or is unable to use the latest protections, leaves end users open to attacks that could have been prevented by an upgrade. Many hackers who find vulnerabilities are finding them in legacy hardware, further exposing the danger these parts pose to end users and the people, data, and assets they aim to protect.

Even running routine regular audits on systems can be an effective tool to safeguard against threats. Audits can reveal problems like blank passwords on highly privileged accounts, or tampering with door sensors, enabling end users to maintain their defences and safeguard against their own worst-case scenarios.

Maintaining cybersecurity can be a challenge, especially as the threat landscape evolves at such a rapid pace. Technologies with built-in cybersecurity reduce the burden of maintenance on users and help ensure systems remain up-to-date and fortified against threats. As Gallagher’s future growth and product roadmap develops, C7000 users will have the foundation in place to immediately benefit from new developments and features as they are released through streamlined updates. Users will have continuous value delivered over the lifespan of the controller, making the return on investment in cybersecurity and functionality worth it for many years to come.

“Cybersecurity is not a destination; it is a continuous journey, and only those prepared to evolve alongside the threat landscape will be able to take their customers on that journey with them,” concludes Cowsley.

[1] www.securitysa.com/*gallagher5


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.