• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Network Security

Integrators Identify 10 Critical Cybersecurity Challenges

Be sure your physical security systems integrator addresses these network security issues.

May 26, 2015 TD Staff Leave a Comment

The March issue of TD sister publication, Security Sales & Integration, features results of the first-ever Physical-Logical Security Assessment. The groundbreaking research brings to light the perceptions and realities of how integrators are adapting to IT convergence ― and especially how they are being impacted by cybersecurity factors. The project included nearly 150 respondents from a variety of company sizes and locations throughout the United States and Canada.

More than 30 questions were posed, most requesting ratings on a 1-10 scale. They covered a broad range of crucial considerations, including products, liability, insurance, contracts, training, the cloud and more. The results could be interpreted as generally positive in that they indicate recognition of short-comings and the willingness to address them. The study encouraged respondents to submit what they viewed to be specific leading physical security challenges relative to cybersecurity. Here is what they indicated, in no particular order. . .

  • “Clients keep using the same passwords, their systems are not fully encrypted, and they don’t use physical keys to access core files.”
  • “Inertia ― cybercrime has expanded exponentially the past five years, but 80% of businesses have taken no new initiatives. There is a belief that a firewall is all that is needed.”
  • “We need to be sure the IT-based products we install are not vulnerable to hacking.”
  • “Concerned manufacturers are including ‘backdoor’ access for products now supplied by only a few factories in Asia.”
  • “A relative lack of familiarity with design/configuration/security best practices coupled with an installed base of devices that are not necessarily designed or maintained or patched to be resistant to modern threats.”
  • “Not yet being capable of filling the role of cybersecurity expert for smaller customers, and not having the technical depth in cybersecurity to integrate seamlessly with enterprise level customers’ IT departments.”
  • “Lack of talent in IT staff. Trained IT professionals are still difficult to hire and keep on staff due to their great demand.”
  • “Inability to maintain trained staff commanding $130,000+ salaries as there is not enough business to justify it. Too many integrators think that can figure it out as they go along.”
  • “Physical and logical security must be addressed contemporaneously; they are not independent variables.”
  • “Security manufacturers, integrators and purchasers must all share the same imperative: Adopt a security-centric approach to network-connected systems of all kinds, from product design through installation and ongoing support/monitoring.”

Tagged With: Antivirus, Corporate, Data Backup & Recovery, Data Security, Malware Protection

Related Content:

  • Cyber technology security lock on screen, network protection Why Security Technology Convergence is Crucial to Future-Proofing…
  • WatchGuard Ransomware WatchGuard: Ransomware on Pace for Record Year
  • Microsoft Defender Microsoft Releases Security Posture Management for Defender for…
  • Microsoft, Windows 8.1 Microsoft Reminds Users That it is Ending Support…

Free downloadable guide you may like:

  • These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

    Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a variety of sources, including Indeed, Robert Half, CompTIA and others.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Uber Advanced Technologies Group Drives its Business Forward

The guiding principle for the new Uber meeting room redesign was “invisible comfort” to ensure that everyone could maximize productivity.

Windows 11
Blueprint Series: Upgrading to Windows 11

Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted...

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.