Integrators Identify 10 Critical Cybersecurity Challenges

Be sure your physical security systems integrator addresses these network security issues.

The March issue of CS’ sister publication,Security Sales & Integration, features results of the first-ever Physical-Logical Security Assessment. The groundbreaking research brings to light the perceptions and realities of how integrators are adapting to IT convergence ― and especially how they are being impacted by cybersecurity factors. The project included nearly 150 respondents from a variety of company sizes and locations throughout the United States and Canada.

More than 30 questions were posed, most requesting ratings on a 1-10 scale. They covered a broad range of crucial considerations, including products, liability, insurance, contracts, training, the cloud and more. The results could be interpreted as generally positive in that they indicate recognition of short-comings and the willingness to address them. The study encouraged respondents to submit what they viewed to be specific leading physical security challenges relative to cybersecurity. Here is what they indicated . . .

Top 10 Cybersecurity Challenges (in no particular order)

1.”Clients keep using the same passwords, their systems are not fully encrypted, and they don’t use physical keys to access core files.”

2.”Inertia ― cybercrime has expanded exponentially the past five years, but 80% of businesses have taken no new initiatives. There is a belief that a firewall is all that is needed.”

3.”We need to be sure the IT-based products we install are not vulnerable to hacking.”

4.”Concerned manufacturers are including ‘backdoor’ access for products now supplied by only a few factories in Asia.”

5.”A relative lack of familiarity with design/configuration/security best practices coupled with an installed base of devices that are not necessarily designed or maintained or patched to be resistant to modern threats.”

6. “Not yet being capable of filling the role of cybersecurity expert for smaller customers, and not having the technical depth in cybersecurity to integrate seamlessly with enterprise level customers’ IT departments.”

7. “Lack of talent in IT staff. Trained IT professionals are still difficult to hire and keep on staff due to their great demand.”

8. “Inability to maintain trained staff commanding $130,000+ salaries as there is not enough business to justify it. Too many integrators think that can figure it out as they go along.”

9.”Physical and logical security must be addressed contemporaneously; they are not independent variables.”

10.”Security manufacturers, integrators and purchasers must all share the same imperative: Adopt a security-centric approach to network-connected systems of all kinds, from product design through installation and ongoing support/monitoring.”

 

If you appreciated this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Leading in Turbulent Times: Effective Campus Public Safety Leadership for the 21st Century

This new webcast will discuss how campus public safety leaders can effectively incorporate Clery Act, Title IX, customer service, “helicopter” parents, emergency notification, town-gown relationships, brand management, Greek Life, student recruitment, faculty, and more into their roles and develop the necessary skills to successfully lead their departments. Register today to attend this free webcast!

Get Our Newsletters
Campus Safety Conference promo