Physical protection against cyberattacks must be strengthened during geopolitical conflict

- Advertisement -

As the world becomes more interconnected thanks to the shift to cloud computing and Internet of Things (IoT) devices, cybercrime is on the rise, and so are the tools to fight it. But geopolitical tensions resulting from ongoing conflicts could quickly spark new devastating attacks around the world, increasing the need for companies to keep an eye on technology.

“In particular, as the conflict between Russia and Ukraine continues, companies in the public and private sectors must be even more vigilant and prepared for malicious cyber activity targeting their networks,” says Warick Melo, an application specialist specializing in cybersecurity and security. Genetec. privacy manager. He advises that to mitigate risk and increase security, even as cyber threats become more sophisticated, companies recognize that the physical and cyber realms are interdependent and take steps to identify and close the vulnerabilities that security systems present and apply best practices and techniques. protocols.

- Advertisement -

Read also:
Learn to create comics
62 best The Sims 4 mods
15 Best Similar HappyMod Apps
Windows 10/11: how to activate without installing anything
The Complete Guide to Character Creation and Design
WordPress: all about website builder

Melo said it might seem ironic that a physical security solution designed to protect people and goods could be an entry point for cybercriminals. But as these systems (video surveillance, access control, alarms, communications, etc.) are increasingly connected to a range of high-speed Internet devices, networks, and computing infrastructure, they can be quite vulnerable.

While security teams are constantly on alert to prevent attacks that remotely stop a camera’s video stream, open or lock a door, or disrupt critical building systems, most cyberattacks are not designed to compromise the physical the safety of people or goods. Instead, these attacks target IT-managed applications, files, and data,” Melo says. An attack from a camera can penetrate the network and block access to important applications; block and store files for ransom; and steal personal information.

Genetec’s analysis showed that many security cameras provide this opportunity for attacks, with nearly seven out of 10 cameras running on outdated firmware. Genetec has also found that many companies have not changed the manufacturer’s default camera security passwords.

Cyber ​​Security – Hidden Risks in Physical Security Systems

Old security devices, especially cameras, can pose a significant cyber risk. Hackers know that some cameras are easy to capture and use as a network entry point. Several factors make it easier to hack cameras, including:

  • Legacy web design – Historically, security and computer technologies have existed in different worlds, which created a backlog in the integration of functions and technologies. The security devices were typically connected to a closed network, which does not meet Internet, Wi-Fi or cellular security requirements.
  • Inadequate service – Many older physical security devices no longer receive firmware updates from manufacturers. Security management protocols may also be outdated and not in line with cybersecurity best practices such as changing passwords frequently.
  • Lack of knowledge “Employees who originally installed and managed physical security systems could leave the company, leaving a gap in knowledge about devices, configurations, and maintenance.
  • vulnerable devices – Cameras made by certain manufacturers have been determined to pose a high level of cyber risk. The US government and the UK Department of Health have banned these cameras, and other governments discourage their use, even ONVIF (Open Network Video Interface Forum), the largest forum for standardization and interoperability between IP solutions in the security industry, has banned these manufacturers. These actions raise concerns around the world about the presence of some of these manufacturers’ cameras on public and private networks.

Closing gaps

To determine the cyber risk of physical security systems, companies must conduct a health assessment by creating and maintaining an inventory of all devices connected to the network, as well as their connections, firmware versions and configuration. As part of the assessment, they should identify models and manufacturers of concern. They should also document all users familiar with devices and security systems.

“This assessment can identify devices and systems that should be replaced. When developing a replacement program, companies should prioritize strategies that support modernization. An effective approach is to combine physical and cybersecurity devices and software on a single open architecture platform with centralized management tools and viewpoints,” says Melo.

For Genetec’s expert, even though this is a larger event, companies are strongly encouraged to bring the cybersecurity and physical security teams together to work collaboratively and proactively so they can develop a comprehensive program based on a shared understanding of risks, responsibilities and strategies. and practices.

This program should include the implementation of best practices after the implementation of secure devices and protocols, ongoing monitoring to ensure that all physical security devices connected to the network are controlled and managed by computer-based network and security management tools. Also check the Video Management System (VMS) and Access Control System (ACS) features that provide alerts or data for use by IT security and network monitoring tools.

“It is also recommended to use secure protocols to connect devices to the network, disable low-security access methods, constantly check the settings of security elements and alerts, and replace the default passwords with new ones that need to be changed regularly,” Melo emphasizes.

Other key measures are end-to-end encryption, which provides enhanced security to protect video and data streams as they travel from the physical security appliance to the control system for viewing. It is also important to ensure that the encryption protects these files and data while they are stored. At the same time, it is recommended to strengthen the security of user and device access through a multi-layered strategy, which should include multi-factor access authentication and specific authorizations based on user privileges.

“For all this to be effective, it is important to update the software frequently, ensuring that the necessary fixes are made, clearly defining who is responsible for keeping information about the availability of updates, as well as for vetoing, implementing and documenting them on all devices. and systems,” confirms the Genetec specialist.

It is also important to ensure that all hardware and software vendors have their physical security systems in place, including component manufacturers in OEM solutions, so that cybersecurity is taken into account in the development of their solutions from the design stage, transparently communicating their possible vulnerabilities. them and take responsibility in case of violation.

“There is no such thing as zero risk when it comes to cybersecurity. By recognizing that the physical and cyber domains are interdependent, applying best practices, and implementing systematic cyber hygiene policies, companies can significantly reduce risk and improve security even against the most sophisticated cyber threats,” concludes Melo.

About Genetech

Genetech Inc. is a global technology company that has been transforming the physical security industry for over 25 years. Today, the company develops solutions designed to enhance the security, intelligence, and operations of businesses, governments, and the communities in which we live. Its flagship product, Security Center, is an open architecture platform that integrates IP video surveillance, access control, automatic license plate recognition (ALPR), communications and analytics. Founded in 1997 and headquartered in Montreal, Canada, Genetec serves its customers through an extensive network of channel partners and certified consultants in over 159 countries.

Talk to us in the comments and let us know if you liked this news and take the opportunity to read more news on our website.

Source : Married Games

- Advertisement -

Subscribe

Related articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here