Developing an effective cybersecurity strategy for the era of interconnectivity

By Roy Alves, Country Manager at Axis Communications South Africa
Within the modern business environment, employees can communicate and collaborate with customers and colleagues from anywhere and anytime, using virtually any device or platform because of technology trends such as mobility and cloud computing.
In this era of interconnectivity, information can also frequently flow between the business and suppliers or partners, while employees utilise big data analytics solutions to gather and disseminate an ever-increasing amount of data on consumers and market trends as well opportunities.
While the interconnectivity has led to efficiency gains on an individual and company-wide level, it has also led to increased security risk, because it has made cybersecurity and physical security more complex.
Where a security manager in charge of physical security systems might have exclusively focussed on creating a closed system that can never be breached, s/he must now adopt a more ecosystem-centric approach. This is the result of converging technologies, with the industry migrating from analogue to IP-based technology for instance, and making use of a new IoT ecosystem, which has culminated in every cybersecurity measure having an impact on everything else on the network.
Even if physical security is run on a separate network from the corporate IT infrastructure (an impractical and expensive solution) human beings are fallible: an inadvertent connection to a broadband router; an accidental cross connection in a wiring closet or any number of unintentional oversights. In the face of all these challenges, how do you develop an effective cybersecurity strategy?

Securing an interconnected web of systems
The solution is to find an optimal way of merging the best practices of both the physical security world with the best practices of a traditional IT domain, without introducing new cybersecurity vulnerabilities for other components in the converged system.
In a converged ecosystem such as an IP-based physical security scenario, the cyber threats and vulnerabilities become far more complex. Not only does the number of components increase, so do the number of vendors that are supplying that technology and the number of users accessing them. To mitigate risks in this kind of an open ecosystem, you need all the vendors operating off the same cybersecurity playbook.

Finding common ground to mitigating cyber risks
IT, physical security and technology manufacturers should be working as a cohesive unit – reaching consensus on current standards and current cyber mitigation technologies that really reflect “Highest Common Denominator” cyber risk mitigation techniques.
In most cases, the video surveillance cameras and video management system (VMS) are selected on two main criteria: their specific intended use – perimeter protection, surveillance in crowded public areas, etc. – and the strength of the vendor to satisfy that specific use. But there’s a third criteria that needs to be considered as well: does Camera Manufacturer A support the same security protocols as VMS Manufacturer B and do these protocols tie seamlessly into IT’s current suite of hardware, software and cyber protection protocols?

Who owns connectivity?
Since the ecosystem runs on IT’s infrastructure, it raises another important question: Who is responsible for the connectivity? Do cybersecurity strategies for the physical security network-attached systems and device now belong to IT? Or does the physical security department mandate that IT support the cybersecurity technologies built into physical security’s solutions? The simplest answer is that physical security management needs to work with integrators and manufacturers to devise solutions that are inherently supportive of IT’s current methodologies for cyber risk mitigation.

Making sure cybersecurity is a team effort
The similarities in cyber protection technologies between IoT and physical security might be self-evident, but there are some key concerns that should remain at the forefront of any system builder. No matter how sophisticated IoT devices and systems become they still operate in an IT world. And as such, they need to adopt a cooperative cyber protection strategy. Mature IoT technologies such as physical security will need to evolve to benefit from some of the emerging IoT cyber protection techniques.
In the meantime, those in the trenches will have to understand the environment their organisation exists in and address the increasing risk of cyber threats as a joint effort between vendor, security professionals and IT. We need to work with common tools to provide the end-user with the best possible cyber protection while living within budgetary constraints.

Comment on This Article

Your email address will not be published. Required fields are marked *

About Us

Axis is a Swedish-based IT company offering network video solutions for professional installations. Founded in 1984 and operating worldwide with offices in more than 20 countries, Axis is an innovative global market leader in network video, driving the ongoing shift from analogue to digital video surveillance.  The products are used for security surveillance and remote monitoring, but also in installations in order to streamline customers’ business processes. Based on open IP standards, Axis network cameras connect to any kind of IP network, including the internet, providing advanced video analytics features, such as motion detection, audio detection and tampering alarm solutions.

Retail: the introduction of network video has revolutionised the way retail professionals work with loss prevention, store optimisation, fraud detection, security and customer service.

Education: students and teachers hampered by the threat of harassment or violence will be comforted by the presence of reliable network cameras in the school’s public spaces.

City Surveillance: Network video is one of the most useful tools for fighting crime and protecting citizens, acting both to detect and deter. In emergencies, network cameras can help police or fire-fighters pinpoint where their assistance is most needed.

Banking: solutions installed in local bank branches can transmit images to a central location for remote viewing us

read more

Contact Us

Tel: +27 11 548 6780

Fax: +27 11 548 6799

Address:

The Crossing
372 Main Road
Bryanston
Johannesburg

Email:sasha.bonheim@axis.com

Web: www.axis.com

read more

Our People

Roy Alves, Sales Director – Africa   

Sasha Bonheim, Marketing Manager

read more