Genetec Warns Legacy Access Cyber Risk

♦ Genetec Warns Legacy Access Cyber Risk – Genetec has warned that legacy access control systems pose cybersecurity risks, with an average loss of $US4.35 million per attack in 2022.

“Many organisations are operating with access control systems that date back 10 years or more,” said Christian Morin, vice president of product engineering and chief security officer at Genetec.

“While these older systems still allow employees to badge in and out, there’s a very high likelihood that these systems employ technologies that are extremely vulnerable to modern cyber threats.”

According to Genetec, cyber criminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to networks. Once a cybercriminal has breached access control system credentials, they can then access an organisation’s network and can gain control of other building systems, view or steal confidential information from internal records, or launch attacks designed to take key systems offline.

“A unified access control system that uses the latest cyber security standards to secure communication, servers, and data such as Genetec Security Center Synergis is able to not only protect an organisation’s assets and people but help them improve their business operations and decision-making,” argues Morin.

“By choosing an open architecture IP-based access control system, organisations have the flexibility to upgrade to the latest supported technology at any time, move at their own pace, and work within their available budget.”

To improve the cybersecurity of access control systems, Genetec recommends the following steps:

* Upgrade the system. Older systems were not built to address today’s threats. When evaluating a new access control system or upgrading an existing system, make sure that cyber security is a key component of the vendor selection criteria

* Use advanced secure credentials and the latest communications protocols to secure data transmission since older credentials are easy to clone using readily available tools

* Educate employees and partners about cyber security best practices and ensure they are prompted to change passwords often

* Regularly check for firmware and software updates and install once available

* Use a centralised identity access management system to ensure virtual and physical authentication and authorisation of employees for better control and more effective maintenance of your systems

* Create a dedicated network for access control systems so that there is clear segregation of networks based on their purpose

* Choose a security provider who can demonstrate compliance with established security certifications

* Ensure that the access control system uses proven data encryption standards as well as multi-factor authentication

* Work with a partner that has strong supply chain risk management, a dedicated team to monitor cyber threats, and ensures software is updated frequently and patched as needed.

#SEN #SENnews #security #electronics