HID Global security survey reveals attitudes about Best Practice for physical access control

Secure identity solutions specialist HID Global has issued an extremely interesting infographic illustrating the results of a survey the company conducted on the subject of physical access control.

The survey of 600 respondents revealed enterprise end users’ perceptions about change and the importance of industry Best Practice, in addition to how well today’s technology and policy Best Practices are being implemented.

Attitudes uncovered in the survey affect how well organisations can defend against increasingly dangerous and costly security threats, both now and in the future.

“This survey raises questions about how well organisations are keeping up with the bad guys,” said John Fenske, vice president of product marketing for physical access control with HID Global.

“Complacency isn’t wise, however, and adherence to industry Best Practice will be increasingly critical in order to take advantage of the coming generation of technologies and capabilities, including mobile access control on smartphones.”

Fenske believes that a reliance on legacy infrastructure, technology and mindsets will make it hard to keep up with today’s technology advances that address “a world of increasingly sophisticated threats”.

Closer look at the infographic’s findings

HID Global’s infographic combines results from its survey with published data on security breaches and associated costs. Here it is…

HID Global's latest physical access control infographic

HID Global’s latest physical access control infographic

Click the link below to view the infographic on HID Global’s website:
HID Global’s new infographic on physical access control

Key findings incorporated into the infographic include:

 Only 37% of users perform annual security assessments, and most users do not contract a third party to test their existing PACS. This means users either conduct their own security audits or penetration exercise internally, or do not test their systems at all.

 More than half of respondents have not upgraded in the last year, and over 20% haven’t upgraded in the last three years.

 75% of end users said cards with cryptography were important. The majority also believe that magstripe and proximity technologies provide adequate security, despite their vulnerability to cloning.

 75% of respondents state that the highest security technologies were important or very important, but half said they weren’t implementing them well or at all. Over 90% felt the most secure policies were important or very important, with only 70% stating that they were implementing them effectively or very effectively.

 Biggest barriers to Best Practice implementation were budget-related and management not seeing value in the investment. Yet the cost of not investing in Best Practice can be very high (for example, $5.4 million for a data breach according to The Ponemon Institute).

HID Global believes that current perceptions about access control will have an impact on the adoption of future technologies. For instance, mobile access control on smartphones will enable a more hassle-free access control experience for users, who can carry all of their keys and credentials on a device they carefully protect and rarely lose or forget.

However, if the market continues to delay shoring up its Best Practices now against today’s threats to traditional cards and readers, it will be difficult for enterprise infrastructures to seamlessly move towards digital credentials carried on smartphones in a BYOD deployment environment with new and different security threats.

Advertisements

Leave a comment

Filed under IFSECGlobal.com News

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s