Data protection

What we know about the Security of our Security

As we’ve seen in our blog series, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

With greater connectivity over the web and multi-organizational access to physical security systems, we are experiencing an increase in the number of attack surfaces that could potentially leave people, data, individual privacy, and assets vulnerable.

Without proper protection, the size, scope, and severity of attacks like the Colonial Pipeline ransomware incident or the National Basketball Association’s (NBA) data breach will likely increase over time. But it’s not all doom and gloom and as we have seen in this series, there are solutions. Both data and system protection mechanisms are available right now, and they are becoming stronger as our industry continues to innovate.

The tools we have  

The post What is encryption and how important is it?  examined how encryption works and the role it plays in keeping data—including security data—from being deciphered by unauthorized users.

Then, in How does authentication work? we discussed how tokens and certificates are used, often in addition to username/password combinations, to ensure that an entity—user, server, or client app—accessing your system is who it claims to be.

And A closer look at authorization looked at how system administrators employ a variety of authorization mechanisms to define user access rights and set up their privileges, thereby helping to ensure individual privacy.

As we look to the future, there is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the cloud.

In addition, the IoT will play an even greater role in all our daily lives. We must be prepared for the technological changes and advancements that lie ahead, and we must work to ensure that our organizations, communities, and citizens remain safe.

To read the entire 6-part Security-of-Security blog series, start here. For information on securing your Genetec unified security platform, read A guide to hardening your Security Center system.