Enterprise Technology Review | Friday, September 11, 2020
As technologies have emerged and evolved and are increasingly connecting us, security threats are also becoming more advanced alongside the techniques that can often enable them for which physical security is essential.
FREMONT, CA: The digital revolution has transformed the world in a multitude of positive ways, but it has created new threats. Social media platforms are offering new ways to plan and coordinate mass-casualty incidents. Over half of these active threat incidents occur in the workplace.
IoT has been a major trend in many industries, and this will continue as the industries integrate the sensors into the network. The analysis and collection of the data collected by these sensors are giving rise to an excess of applications like industrial applications, intelligent building management, and event management. The physical security industry also benefits by having additional intelligence for situational awareness and emergency management.
Since most of the physical security applications comprise since the collection of video and data about people and assets, privacy regulations will ceaselessly evolve to have a significant impact on the industry well into the future. Mobility is a critical platform for physical security and is evolving through the development and use of cloud-based services to access security devices through a smartphone or Web-based browser.
Not only is the physical security and cybersecurity similar in their aims, but also the two once discrete industries are beginning to converge. There is a certain cybersecurity risk when utilizing physical security systems, particularly following the rise of network cameras, open access control, and also the IP audio. The increased use of connected IoT devices, as well as the enhancing sophistication and ability of the hackers, has meant the levels of risk to rise.
It is time for physical security practitioners, whether consultants, installers, or end-users, take a step back and properly assess what the potential cybersecurity issues are when designing, specifying, installing, and operating the physical and electronic security systems.
See Also: Top IoT Solution Companies
Read Also