Story image

Fundamental shift: A look inside the rising role of IT in physical access control

Shifting budgets and responsibilities require IT and physical security teams to consider a fundamental change in day-to-day operations.

While physical security professionals have suspected a shift toward increased involvement of the IT department in physical access control, recent research has shown this to be true. 

A survey conducted by The 05 Group of more than 1,500 IT Managers, Directors and staff, as well as Chief Information and Chief Technology Officers, found that IT departments are now more involved than ever in an organisation’s physical access control decisions and implementation. 

According to the survey, more than half (55%) of respondents reported IT as primarily responsible or having shared responsibility for access control within their organisation. 

As a result, IT leaders are tasked with spearheading not only the protection of their company’s network and cybersecurity-related initiatives but also those set forth by the Physical Security department to protect employees, visitors and assets from internal and external threats. 

Similarly, the study showed that the IT department will increasingly play a role in physical security to influence technology decisions (76%) through the integration of access control within the ecosystem (72%), by implementing access control technology (59%), and through the management of access control systems (39%). 

Along with the added responsibility to help implement security solutions alongside IT-related projects, IT leaders are also increasingly responsible for budgeting decisions within physical security. 

According to the survey, more than 85% of respondents reported that IT was involved in decisions regarding physical access control technology investments. 

To get access to the complete case study click here.

Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.