Physical security and cybersecurity – are they so different?

    Large organizations will typically have a physical security team and a separate IT team focused on cybersecurity.  Both teams protect the organization’s assets and resources.  So it is natural that one may think that this would make them great friends. The challenge is that the assets and resources are different.  Protection is an obstacle designed […]

      Building trust in banking through robust cybersecurity

      There’s a old Dutch proverb: ”Trust arrives on foot, but leaves on horseback”. Nowhere is this truer than in the world of banking. It’s an industry built on trust between a bank and its customers, who hand over their most valuable assets and expect them to be kept safe and secure. For many decades after […]

        Key tips for cybersecurity protection at your critical site

        It goes without saying that a cybersecurity attack in critical infrastructure could cause a catastrophic impact. Making sure you are constantly thinking about your critical site’s cyber plan and asking the right questions is a key component of securing your site. In this blog, I continue my conversation with Ryan Zatolokin, Business Development Manager, Senior […]

          What are the cybersecurity issues in video surveillance?

          Cybersecurity has become a growing concern for consumers and companies in every sector, at every step of the supply chain. The surveillance industry is no exception. Far from the days of CCTV cameras, which held information for a finite time and were not connected to the internet, the advances in digital video mean that connected […]

            Why cybersecurity for critical infrastructure matters: How to better protect your devices

            Any device connected to a network may be susceptible for hackers to gain access to. Therefore, cybersecurity is a top priority for everyone. Unfortunately, all networked devices and systems can be vulnerable. When those devices are used in high-risk environments like critical infrastructure, the consequences of a breach could be more far-reaching, with the potential to […]

              The cybersecurity risk of physical security technology

              Although some may view physical security and cybersecurity as two very different practices, at their core they both achieve the same thing: protecting people, assets, brands and reputations. One of the cornerstones of doing this successfully is ensuring effective risk assessments are undertaken. Not only are physical security and cybersecurity similar in their aims, but […]