Data protection has been in the news a lot recently; not only the issues around hacking and malware, but perhaps more importantly on the issues of how data is handled within (and across) organizations. In 2018 the EU will have the General Data Protection Regulation (GDPR) go into effect, covering millions of people’s personal information. As shown in this chart from DLA Piper, much of the world today is covered by either “heavy” or “robust” data protection. To pull one number out of many to make the point, the State of California alone has over 25 data privacy and governance laws.
Even if you’ve never played “Whack-A-Mole” you’ve probably heard it used as a metaphor for a repetitious and futile task. In maintaining and servicing physical security systems there are a number of manual operations that fall in that category that are better done with automation; checking that default passwords aren’t being used, verifying operational status across multiple sites and/or device vendors, and maintaining an inventory of devices on the physical security network just to name a few. Since there are more than one “Whack-A-Mole” situations our industry deals with I’ll be more specific – the topic of this blog is a situation Viakoo calls “Console Madness”. If you want to stop reading and just see our new infographic on Console Madness please click here – otherwise continue on to see the Madness I’m referring to.
Fact: Organizations across many industries are subject to government and other regulations and must demonstrate physical security compliance on a regular basis.
Every organization has differences in how they accomplish their job, which can be thought of as tradeoffs. Restaurant A might choose to open early for breakfast, trading off the additional employee expenses for ability to gain higher revenues and profits. Restaurant B, considering whether to serve breakfast may decide against it because while it might be profitable it goes against their brand image as the “dinner” place. No one would accuse either restaurant of a bad decision, just a difference in how they decide to run their business and the tradeoffs they make.
Join the revolution! Everyone’s doing it!
Some industries, such as nuclear energy and securities trading, are long accustomed to regulation, compliance, and auditing. In recent years, though, increased regulation and protections have been implemented in broad new areas including medical records and credit card transactions, among others. In such an evolving landscape for regulations, it is important for organizations to know how to navigate these changes, and what tools might be available to help them comply with confidence.
By now, virtually every organization has recognized the need to invest in video surveillance and access control technology in order to prevent and mitigate risk. So when it comes to making sure that technology is delivering on your investment, why would you ever take any kind of risk?
Today’s physical security environments are complex. It is common to find a mix of analog and IP technology, along with environments that are multi-vendor, multi-generational, multi-application, and more often than not, span across multiple sites. One can imagine the challenge this presents to service teams for diagnosing and troubleshooting problems quickly and efficiently when they arise.
Note: Today's blog is contributed by Ralph Goodman from the Lock Blog. Viakoo is honored to have guest blogs from the greater physical security community. To contribute to our blog please contact firstname.lastname@example.org)
The times are changing. Older methods of physical security are being phased out by more comprehensive and complex systems. These are not expensive flashy upgrades. They are the practical successors to outdated security measures. Much in the same way we no longer use pointed sticks to guard our caves, we can no longer rely on traditional physical security to protect the important things in our lives. With the types of threats that exist today, companies and individuals are more vulnerable than they have ever been. It is just no longer enough to point your stick at the opening to your cave. It is time to automate your physical security.
Every now and then you read an article, and its only days later that the real implications of it come to mind (some call it an “a-ha moment”, others might just consider me a slow thinker). That a-ha moment happened for me with a report from IHS Markit that pegs service & maintenance services as leading revenue growth for the security industry.