• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Integrators Identify 10 Critical Cybersecurity Challenges

Be sure your physical security systems integrator addresses these network security issues.

May 26, 2015 TD Staff Leave a Comment

The March issue of TD sister publication, Security Sales & Integration, features results of the first-ever Physical-Logical Security Assessment. The groundbreaking research brings to light the perceptions and realities of how integrators are adapting to IT convergence ― and especially how they are being impacted by cybersecurity factors. The project included nearly 150 respondents from a variety of company sizes and locations throughout the United States and Canada.

More than 30 questions were posed, most requesting ratings on a 1-10 scale. They covered a broad range of crucial considerations, including products, liability, insurance, contracts, training, the cloud and more. The results could be interpreted as generally positive in that they indicate recognition of short-comings and the willingness to address them. The study encouraged respondents to submit what they viewed to be specific leading physical security challenges relative to cybersecurity. Here is what they indicated, in no particular order. . .

  • “Clients keep using the same passwords, their systems are not fully encrypted, and they don’t use physical keys to access core files.”
  • “Inertia ― cybercrime has expanded exponentially the past five years, but 80% of businesses have taken no new initiatives. There is a belief that a firewall is all that is needed.”
  • “We need to be sure the IT-based products we install are not vulnerable to hacking.”
  • “Concerned manufacturers are including ‘backdoor’ access for products now supplied by only a few factories in Asia.”
  • “A relative lack of familiarity with design/configuration/security best practices coupled with an installed base of devices that are not necessarily designed or maintained or patched to be resistant to modern threats.”
  • “Not yet being capable of filling the role of cybersecurity expert for smaller customers, and not having the technical depth in cybersecurity to integrate seamlessly with enterprise level customers’ IT departments.”
  • “Lack of talent in IT staff. Trained IT professionals are still difficult to hire and keep on staff due to their great demand.”
  • “Inability to maintain trained staff commanding $130,000+ salaries as there is not enough business to justify it. Too many integrators think that can figure it out as they go along.”
  • “Physical and logical security must be addressed contemporaneously; they are not independent variables.”
  • “Security manufacturers, integrators and purchasers must all share the same imperative: Adopt a security-centric approach to network-connected systems of all kinds, from product design through installation and ongoing support/monitoring.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Antivirus, Corporate, Data Backup & Recovery, Data Security, Malware Protection

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.