What We Know About the Security of Our Security
As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size. With greater connectivity over the web and multi-organizational access to physical security systems, we are experiencing an increase in the number of attack surfaces that could potentially leave people, data, individual privacy, and assets vulnerable.
In fact, 2016 saw even more stories about cyber-attacks, ranging from strangers hacking into baby monitors, to emails being hacked at the FBI and Department of Homeland Security. And we know that, without proper protection, the size, scope, and severity of these types of attacks will likely increase over time. But it’s not all doom and gloom and as we have seen in this series, there are solutions. Both data and system protection mechanisms are available right now, and they are becoming stronger as our industry continues to innovate.
The tools we have
The post What is Encryption and How Important is it? examined how encryption works and the role it plays in keeping data—including security data—from being deciphered by unauthorized users.
Then, in How does Authentication Work?, we discussed how tokens and certificates are used, often in addition to username/password combinations, to ensure that an entity—user, server, or client app—accessing your system is who it claims to be.
And A Closer look at Authorization looked at how system administrators employ a variety of authorization mechanisms to define user access rights and set up their privileges, thereby helping to ensure individual privacy.
As we look to the future, there is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the Cloud. In addition, the IoT will play an even greater role in all our daily lives. We must be prepared for the technological changes and advancements that lie ahead, and we must work to ensure that our organizations, communities, and citizens remain safe.
Search Blog Topics
How Secure Is Your Physical Security System?
A Guide to Hardening Your Security Center System
A Closer Look at Physical Security System Vulnerabilities
What is Encryption and How Important is it?
How does Authentication Work?
A Closer Look at Authorization