August 26, 2022

Cyber and Physical Security Convergence | What It Is and Why You Should Care

I received a call earlier this year from a client that wanted us to help its business partner who had just suffered a ransomware attack. This malicious computer program spreads like a virus throughout a company and then encrypts all computer systems at once, rendering them inoperable. Then they asked the company to pay a 'ransom' to get the key that would unencrypt their systems.

These attacks can be so severe as to cause companies to go out of business. Imagine walking into your office on Monday and being unable to access your computer or any company application! Companies are often forced to pay the ransom, sometimes measured in millions of dollars.

Ransomware attacks happen all the time.

What set this incident apart was how the business partner was infiltrated.

The attacker found and exploited a weakness in the physical security systems. The victim had installed security cameras on the network that could be monitored remotely. As is often the case, the victim hadn't proactively embraced a converged security program.

The physical security and cybersecurity teams had no formal working partnership, no mutual accountability, and siloed management teams. Without this critical partnership, each team assumed the other had things covered, exposing the business to serious harm.

There is a good reason why many companies have technology and physical security teams that don't proactively work together. It's the same reason why the frog in the pot doesn't notice that the water is getting hotter. The world has changed around us, and many of us are too busy with our 'real job' to notice.

There are a lot of changes driving the need for cyber-physical security awareness. Here are a few worth considering:


IoT

The Internet of Things is both a buzzword and a reality. Literally, everything is shipping with the ability to connect to the network and then to the Internet. Physical security systems, surveillance cameras, and building automation systems often require a network connection to function.


Technology empowerment

It used to take some technical expertise to configure a device to work on the network and connect with the Internet. To make technology more accessible (i.e., to sell more technology to more people), manufacturers have worked diligently to simplify this process so that almost anyone can connect their device to the Internet.


Increased focus from the 'bad guys'

Cyber-physical attacks are increasingly common because they are relatively easy to execute and can be very lucrative. Cybercriminals see IoT devices as the path of least resistance to companies and sometimes leverage them to steal data, extort money, compromise trusted third parties, and even intentionally cause operational disruption. In some cases, access to compromised corporate security systems is sold to the highest bidder on the dark web.


So, what does converged security mean, and how do you know if you are doing it? Well, it starts with a conversation between your organization's technology and facility teams. Try asking the following questions to get the discussion going.


Conversation Starters

From IT to the Facilities Team

From Facilities to the IT Team

What can we (the technology team) do to make ourselves more available to you?

Did you know that we have camera / security / building systems that connect to the network?

Have there been times when you needed to connect a device to the network where we could have helped?

Did you know that some of these systems require management over the Internet or through the Cloud?

Do you have a list of systems that have access to our network?

Are our facility systems on isolated/dedicated network infrastructure?

Do any of your systems connect to our WiFi network?

If they aren’t on isolated networks, is the technology team able to accept the risk to the business if we are compromised?

From IT to the Facilities Team

What can we (the technology team) do to make ourselves more available to you?

Have there been times when you needed to connect a device to the network where we could have helped?

Do you have a list of systems that have access to our network?

Do any of your systems connect to our WiFi network?

From Facilities to the IT Team

Did you know that we have camera / security / building systems that connect to the network?

Did you know that some of these systems require management over the Internet or through the Cloud?

Are our facility systems on isolated/dedicated network infrastructure?

If they aren’t on isolated networks, is the technology team able to accept the risk to the business if we are compromised?


Having a conversation is a great place to start. However, the discussion should eventually result in process and even organizational change. Without these changes, your company could be the proverbial submarine with a screen door.

Stay tuned for our next article on Security Convergence: "How to Prevent Hackers and Threats."

If you need help with your physical or cyber security, contact us today.

Contact Us

About the author 

Glenn Johnson

Glenn Johnson is the CEO / Principal Engineer for Vizius. Vizius is a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction. They deliver objectively valuable insight through quantitative risk analysis, assessments and penetration testing.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
>