As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size. With greater connectivity over the web and multi-organizational access to physical security systems, we are experiencing an increase in the number of attack surfaces that could potentially leave people, data, individual privacy, and assets vulnerable.
In fact, 2016 saw even more stories about cyber-attacks, ranging from strangers hacking into baby monitors, to emails being hacked at the FBI and Department of Homeland Security. And we know that, without proper protection, the size, scope, and severity of these types of attacks will likely increase over time. But it’s not all doom and gloom and as we have seen in this series, there are solutions. Both data and system protection mechanisms are available right now, and they are becoming stronger as our industry continues to innovate.
The tools we have:
The post What is Encryption and How Important is it? examined how encryption works and the role it plays in keeping data—including security data—from being deciphered by unauthorized users.
Then, in How does Authentication Work?, we discussed how tokens and certificates are used, often in addition to username/password combinations, to ensure that an entity—user, server, or client app—accessing your system is who it claims to be.
And A Closer look at Authorization looked at how system administrators employ a variety of authorization mechanisms to define user access rights and set up their privileges, thereby helping to ensure individual privacy.
As we look to the future, there is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the Cloud. In addition, the IoT will play an even greater role in all our daily lives. We must be prepared for the technological changes and advancements that lie ahead, and we must work to ensure that our organizations, communities, and citizens remain safe.This article originally appeared on Genetec.com.
The security of security systems (access control, video, and so on) is a major concern for organizations of every size.
Click on the button below to get accessUnlock Now
Or sign in to access all content on Comcast Business Community