Integrators Identify 10 Critical Cybersecurity Challenges

Be sure your physical security systems integrator addresses these network security issues.

The March issue of CS’ sister publication,Security Sales & Integration, features results of the first-ever Physical-Logical Security Assessment. The groundbreaking research brings to light the perceptions and realities of how integrators are adapting to IT convergence ― and especially how they are being impacted by cybersecurity factors. The project included nearly 150 respondents from a variety of company sizes and locations throughout the United States and Canada.

More than 30 questions were posed, most requesting ratings on a 1-10 scale. They covered a broad range of crucial considerations, including products, liability, insurance, contracts, training, the cloud and more. The results could be interpreted as generally positive in that they indicate recognition of short-comings and the willingness to address them. The study encouraged respondents to submit what they viewed to be specific leading physical security challenges relative to cybersecurity. Here is what they indicated . . .

Top 10 Cybersecurity Challenges (in no particular order)

1.”Clients keep using the same passwords, their systems are not fully encrypted, and they don’t use physical keys to access core files.”

2.”Inertia ― cybercrime has expanded exponentially the past five years, but 80% of businesses have taken no new initiatives. There is a belief that a firewall is all that is needed.”

3.”We need to be sure the IT-based products we install are not vulnerable to hacking.”

4.”Concerned manufacturers are including ‘backdoor’ access for products now supplied by only a few factories in Asia.”

5.”A relative lack of familiarity with design/configuration/security best practices coupled with an installed base of devices that are not necessarily designed or maintained or patched to be resistant to modern threats.”

6. “Not yet being capable of filling the role of cybersecurity expert for smaller customers, and not having the technical depth in cybersecurity to integrate seamlessly with enterprise level customers’ IT departments.”

7. “Lack of talent in IT staff. Trained IT professionals are still difficult to hire and keep on staff due to their great demand.”

8. “Inability to maintain trained staff commanding $130,000+ salaries as there is not enough business to justify it. Too many integrators think that can figure it out as they go along.”

9.”Physical and logical security must be addressed contemporaneously; they are not independent variables.”

10.”Security manufacturers, integrators and purchasers must all share the same imperative: Adopt a security-centric approach to network-connected systems of all kinds, from product design through installation and ongoing support/monitoring.”

 

Read More Articles Like This… With A FREE Subscription

Campus Safety magazine is another great resource for public safety, security and emergency management professionals. It covers all aspects of campus safety, including access control, video surveillance, mass notification and security staff practices. Whether you work in K-12, higher ed, a hospital or corporation, Campus Safety magazine is here to help you do your job better!

Get your free subscription today!


Get Our Newsletters
Campus Safety Online Summit On-Demand Campus Safety HQ