Through the increasing link between cyber and physical security, it is well known that vulnerabilities exposed in one can affect the other.
Bad actors are constantly trying to find ways to infiltrate a business or firm’s most sensitive data and information, worming their way through systemic flaws in order to access important assets.
In a new piece for World Pipelines, Steven Kenny, of Axis Communications, explores how necessary it is that network security devices avoid standing as the “weak links” in the cybersecurity systems for energy providers. Outside of the energy sector, Kenny’s words are helpful reminders for businesses at large — it’s important to shore up inherent flaws so that attackers can’t compromise a company’s most sensitive assets.
To start, Kenny cites that the recent Colonial Pipeline cyber-attack was a wakeup call to the energy sector, revealing how criminals tapping into security vulnerabilities can greatly impact the country’s critical national infrastructure (CNI). To avoid these kind of attacks from making an impact, Kenny writes that installing physical security systems “that are manufactured with cybersecurity as a prime consideration” is paramount.
“A security system is only as strong as its weakest link and it’s imperative that these systems are not left open to attack, compromising the physical security of a site or multiple sites,” he adds.
Customization is key. He said physical and cyber security considerations vary site-by-site — all companies’ needs vary from one another.
Kenny points to surveillance cameras with onboard analytics, infrared motion detection, access control devices, and video management system (VMS) that offers alarm verification as all key technologies to adopt. He calls all of this a “multi-layering of different measures,” or a “defense-in-depth” approach. This “ensures that security is not significantly reduced with the loss of any single layer.”
Kenny writes that security systems based on Internet of Things (IoT) devices all possess significant risk.
“Network surveillance cameras, for example, which are not cyber secure can be used as a backdoor to gain access to the IT network, either from an insider threat or a remotely triggered assault,” Kenny explains. “Technologies manufactured in regions with lower standards of regulation and compliance might appear to offer adequate protection, but in reality, come with none of the assurances around quality of manufacture or adherence to cybersecurity principles. Secure technologies, built with cybersecurity considerations at the forefront, should form an essential part of any enterprise asset protection strategy.”
With these realities in mind. Kenny offers a clarion call to security leaders. When introducing any device or new security protocol, it is imperative that one thinks ahead of time, anticipating any potential vulnerability and making sure safeguards are in place before an attack even hits.