Contributed By


Christian Morin

Vice President, Cloud Services at Genetec

View Profile

What We Know About the Security of Our Security

April 27, 2017

The security of security systems (access control, video, and so on) is a major concern for organizations of every size.

As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size. With greater connectivity over the web and multi-organizational access to physical security systems, we are experiencing an increase in the number of attack surfaces that could potentially leave people, data, individual privacy, and assets vulnerable.

In fact, 2016 saw even more stories about cyber-attacks, ranging from strangers hacking into baby monitors, to emails being hacked at the FBI and Department of Homeland Security. And we know that, without proper protection, the size, scope, and severity of these types of attacks will likely increase over time. But it’s not all doom and gloom and as we have seen in this series, there are solutions. Both data and system protection mechanisms are available right now, and they are becoming stronger as our industry continues to innovate.

The tools we have:  

The post What is Encryption and How Important is it?  examined how encryption works and the role it plays in keeping data—including security data—from being deciphered by unauthorized users.

Then, in How does Authentication Work?, we discussed how tokens and certificates are used, often in addition to username/password combinations, to ensure that an entity—user, server, or client app—accessing your system is who it claims to be.

And A Closer look at Authorization looked at how system administrators employ a variety of authorization mechanisms to define user access rights and set up their privileges, thereby helping to ensure individual privacy.

As we look to the future, there is little doubt that organizations will increase their connections with one another, extend their security systems, and continue to move to the Cloud. In addition, the IoT will play an even greater role in all our daily lives. We must be prepared for the technological changes and advancements that lie ahead, and we must work to ensure that our organizations, communities, and citizens remain safe.

This article originally appeared on

This article is available exclusively to
Comcast Business Community Members.

Join the Comcast Business Community to read this article
and get access to all the resources and features on the site.

It's free to sign up


Join the Discussion

300 Characters Left

To Comment either Register or Login:


To view the rules of engagement for commenting on Comcast Community click here



Resource Center

Why Comcast
Comcast Business delivers fast, reliable networking solutions built for business performance and growth

Current Offers
Take advantage of our limited time offers with a customized plan built to give your business an edge over competitors

Community Forums
Find solutions, share knowledge and get answers from customers and experts

Help & Support
Get help and support from Comcast experts

Resource Library
Find out how Comcast has helped clients like you meet their needs with informative White Papers, Case Studies and more

Internet Speed Test
Try the Comcast Business Internet Speed Test to see how your business stacks up

Social Media
Connect with Comcast and join the conversation on LinkedIn, Twitter, and Facebook

Take your business beyond

Fast is the nation's largest Gig-speed network. Beyond Fast is technology that helps business boom.
Learn more about Comcast Business solutions that can help your business perform better.