{"id":1592,"date":"2016-10-13T15:04:20","date_gmt":"2016-10-13T15:04:20","guid":{"rendered":"https:\/\/www.activo.ca\/blog\/?p=1592"},"modified":"2024-01-15T16:52:41","modified_gmt":"2024-01-15T16:52:41","slug":"3-ways-to-maximize-the-security-of-your-security-systems","status":"publish","type":"post","link":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/","title":{"rendered":"3 Ways to Maximize the Security of Your Security Systems"},"content":{"rendered":"<p>You have security cameras and a Video Management System (VMS) set up. Your doors are controlled, requiring <a href=\"https:\/\/www.activo.ca\/activo-services\/activo-security\/ip-access-control.html\">validated credentials from anyone who wants to gain access<\/a>.<\/p>\n<p><em>But what about the system itself? Is it secure?<\/em><\/p>\n<p>Whether it\u2019s a stranger hacking into a video monitor or accessing confidential emails, <a href=\"https:\/\/www.activo.ca\/activo-services\/activo-security.html\">security is a major concern<\/a> for companies and organizations of all sizes. Although cyber-attacks are unlikely to end anytime soon, it\u2019s reassuring to remember that system and data protection mechanisms will also continue to become stronger and stronger.<\/p>\n<p><strong>We\u2019ve highlighted three key tools you can use to keep vulnerable data, assets, and systems protected<\/strong>:<\/p>\n<h2>1. \u00a0Encryption<\/h2>\n<p>Encrypting data means encoding it, ensuring unauthorized users won\u2019t be able to see or access sensitive data or private information.<\/p>\n<p>The process is done using an encryption key. The key then uses an encryption algorithm, which translates (or encodes) readable data (or plaintext) into unreadable data (or ciphertext). Only the right decryption key will then be able to decode that ciphertext into plaintext.<\/p>\n<p><strong>An encryption algorithm can be either symmetric or asymmetric<\/strong>:<\/p>\n<ul>\n<li>With <strong>symmetric encryption algorithms<\/strong>, the encryption and decryption keys will be the same. They\u2019re faster and easier to implement, making them ideal for bulk data encryption. The downside, however, is that anyone who has the decryption key will be able to access your data (whether or not it\u2019s meant for their eyes).<\/li>\n<\/ul>\n<ul>\n<li><strong>Asymmetric algorithms<\/strong> use two separate but mathematically linked encryption keys. You can use a public key to encrypt the data, which means it can be widely distributed, while a private key is needed for decryption to guarantee security. The reverse is also possible (encrypting the data with a private key and decrypting it with a public one). The disadvantages are that asymmetric algorithms are slower and require a greater amount of computation to set up.<\/li>\n<\/ul>\n<h2>2. \u00a0Authentication<\/h2>\n<p>Authentication is a two-step process. First, you need to determine that an entity (user, server, or client application) is who or what it claims it is. Second, you need to verify if and how it should have access.<\/p>\n<p>This process can happen on the server-side, client-side, or both. <strong>The difference between the two is that while client-side authentication uses techniques like tokens or usernames\/passwords, server-side authentication uses certificates<\/strong>:<\/p>\n<ul>\n<li><strong>A token<\/strong> is a type of claims-based authentication, which is achieved by presenting valid and signed information. It works in the same way as a boarding pass. Presenting only your passport at the gate isn\u2019t going to get you on the plane. You first need to be vetted through picture ID before you\u2019re given your boarding pass, which lets the airline verify your claim.<\/li>\n<\/ul>\n<ul>\n<li><strong>A digital certificate<\/strong> proves ownership over a public key. It includes information about the key itself, its owner, and the digital signature of the signer to confirm it\u2019s communicating with the correct entities. Certificates are commonly used on HTTPS-based websites to validate the authenticity of a web server.<\/li>\n<\/ul>\n<p>Authentication is crucial for keeping data protected and preventing unauthorized access \u2013 preventing hackers from pretending to be security servers to control, copy, or manipulate valuable data.<\/p>\n<h2>3. Authorization<\/h2>\n<p>Authorization lets security system administrators specify user access privileges and rights, restricting activities by:<\/p>\n<ul>\n<li>Granting access to groups or individuals for applications, resources, or data.<\/li>\n<li>Defining what users will be able to do with resources.<\/li>\n<li>Controlling how long data will be kept.<\/li>\n<li>Selecting information that can be distributed, shared, or modified.<\/li>\n<\/ul>\n<p>Setting access and activity parameters is especially important for video surveillance.<\/p>\n<p>Whatever type of security infrastructure you have, it\u2019s important to <a href=\"https:\/\/www.activo.ca\/activo-services\/activo-security\/beyond-security.html\">ensure it\u2019s protected at every level<\/a>. This will <a href=\"http:\/\/www.genetec.com\/about-us\/news\/blog\/how-secure-is-your-physical-security-system#.V_5rGPkrKCi\">enhance the security of the entire system<\/a> and all the elements to which it\u2019s connected.<\/p>\n<hr \/>\n<p><strong>Activo is proud to be partner with trusted suppliers to provide advanced, leading-edge security systems and network solutions.\u00a0<\/strong><a href=\"https:\/\/www.activo.ca\/contact.html\"><strong>Contact us today to discuss the security and networking technologies that will be right for your business.<\/strong><\/a><strong>\u00a0\u00a0<\/strong><\/p>\n<p><strong>More from Activo<\/strong>:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.activo.ca\/blog\/5-steps-to-create-an-effective-incident-response-program\/\">5 Steps to Create an Effective Incident Response Program<\/a><\/li>\n<li><a href=\"https:\/\/www.activo.ca\/blog\/its-your-move-part-three-network-cabling-considerations\/\">Network Cabling Considerations<\/a><\/li>\n<li><a href=\"https:\/\/www.activo.ca\/blog\/5-types-of-security-network-cameras\/\">5 Types of Security Network Cameras<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You have security cameras and a Video Management System (VMS) set up. Your doors are controlled, requiring validated credentials from anyone who wants to gain access. But what about the system itself? Is it secure? Whether it\u2019s a stranger hacking into a video monitor or accessing confidential emails, security is a major concern for companies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1941,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[38],"tags":[],"class_list":["post-1592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-physical-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Ways to Maximize the Security of Your Security Systems | Activo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Ways to Maximize the Security of Your Security Systems | Activo\" \/>\n<meta property=\"og:description\" content=\"You have security cameras and a Video Management System (VMS) set up. Your doors are controlled, requiring validated credentials from anyone who wants to gain access. But what about the system itself? Is it secure? Whether it\u2019s a stranger hacking into a video monitor or accessing confidential emails, security is a major concern for companies [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Activo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ActivoCanada\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-13T15:04:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-15T16:52:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Activo Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@activocanada\" \/>\n<meta name=\"twitter:site\" content=\"@activocanada\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Activo Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\"},\"author\":{\"name\":\"Activo Team\",\"@id\":\"https:\/\/www.activo.ca\/#\/schema\/person\/b25e0124f7cd12b957d3d94e71d009bb\"},\"headline\":\"3 Ways to Maximize the Security of Your Security Systems\",\"datePublished\":\"2016-10-13T15:04:20+00:00\",\"dateModified\":\"2024-01-15T16:52:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\"},\"wordCount\":681,\"publisher\":{\"@id\":\"https:\/\/www.activo.ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png\",\"articleSection\":[\"Physical Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\",\"url\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\",\"name\":\"3 Ways to Maximize the Security of Your Security Systems | Activo\",\"isPartOf\":{\"@id\":\"https:\/\/www.activo.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png\",\"datePublished\":\"2016-10-13T15:04:20+00:00\",\"dateModified\":\"2024-01-15T16:52:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage\",\"url\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png\",\"contentUrl\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png\",\"width\":720,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.activo.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Ways to Maximize the Security of Your Security Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.activo.ca\/#website\",\"url\":\"https:\/\/www.activo.ca\/\",\"name\":\"Activo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.activo.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.activo.ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.activo.ca\/#organization\",\"name\":\"Activo\",\"url\":\"https:\/\/www.activo.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.activo.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2023\/03\/logo_black.png\",\"contentUrl\":\"https:\/\/www.activo.ca\/wp-content\/uploads\/2023\/03\/logo_black.png\",\"width\":171,\"height\":60,\"caption\":\"Activo\"},\"image\":{\"@id\":\"https:\/\/www.activo.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ActivoCanada\",\"https:\/\/x.com\/activocanada\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.activo.ca\/#\/schema\/person\/b25e0124f7cd12b957d3d94e71d009bb\",\"name\":\"Activo Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.activo.ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e76fa9b97ebb6bb7b139977582f880fd2bb95046e5063f06c6e45c3424a388d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e76fa9b97ebb6bb7b139977582f880fd2bb95046e5063f06c6e45c3424a388d5?s=96&d=mm&r=g\",\"caption\":\"Activo Team\"},\"sameAs\":[\"https:\/\/www.activo.ca\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Ways to Maximize the Security of Your Security Systems | Activo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/","og_locale":"en_US","og_type":"article","og_title":"3 Ways to Maximize the Security of Your Security Systems | Activo","og_description":"You have security cameras and a Video Management System (VMS) set up. Your doors are controlled, requiring validated credentials from anyone who wants to gain access. But what about the system itself? Is it secure? Whether it\u2019s a stranger hacking into a video monitor or accessing confidential emails, security is a major concern for companies [&hellip;]","og_url":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/","og_site_name":"Activo","article_publisher":"https:\/\/www.facebook.com\/ActivoCanada","article_published_time":"2016-10-13T15:04:20+00:00","article_modified_time":"2024-01-15T16:52:41+00:00","og_image":[{"width":720,"height":720,"url":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","type":"image\/png"}],"author":"Activo Team","twitter_card":"summary_large_image","twitter_creator":"@activocanada","twitter_site":"@activocanada","twitter_misc":{"Written by":"Activo Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#article","isPartOf":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/"},"author":{"name":"Activo Team","@id":"https:\/\/www.activo.ca\/#\/schema\/person\/b25e0124f7cd12b957d3d94e71d009bb"},"headline":"3 Ways to Maximize the Security of Your Security Systems","datePublished":"2016-10-13T15:04:20+00:00","dateModified":"2024-01-15T16:52:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/"},"wordCount":681,"publisher":{"@id":"https:\/\/www.activo.ca\/#organization"},"image":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","articleSection":["Physical Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/","url":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/","name":"3 Ways to Maximize the Security of Your Security Systems | Activo","isPartOf":{"@id":"https:\/\/www.activo.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","datePublished":"2016-10-13T15:04:20+00:00","dateModified":"2024-01-15T16:52:41+00:00","breadcrumb":{"@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#primaryimage","url":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","contentUrl":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","width":720,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.activo.ca\/"},{"@type":"ListItem","position":2,"name":"3 Ways to Maximize the Security of Your Security Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.activo.ca\/#website","url":"https:\/\/www.activo.ca\/","name":"Activo","description":"","publisher":{"@id":"https:\/\/www.activo.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.activo.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.activo.ca\/#organization","name":"Activo","url":"https:\/\/www.activo.ca\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.activo.ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.activo.ca\/wp-content\/uploads\/2023\/03\/logo_black.png","contentUrl":"https:\/\/www.activo.ca\/wp-content\/uploads\/2023\/03\/logo_black.png","width":171,"height":60,"caption":"Activo"},"image":{"@id":"https:\/\/www.activo.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ActivoCanada","https:\/\/x.com\/activocanada"]},{"@type":"Person","@id":"https:\/\/www.activo.ca\/#\/schema\/person\/b25e0124f7cd12b957d3d94e71d009bb","name":"Activo Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.activo.ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e76fa9b97ebb6bb7b139977582f880fd2bb95046e5063f06c6e45c3424a388d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e76fa9b97ebb6bb7b139977582f880fd2bb95046e5063f06c6e45c3424a388d5?s=96&d=mm&r=g","caption":"Activo Team"},"sameAs":["https:\/\/www.activo.ca"]}]}},"_links":{"self":[{"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/posts\/1592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/comments?post=1592"}],"version-history":[{"count":0,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/posts\/1592\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/media\/1941"}],"wp:attachment":[{"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/media?parent=1592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/categories?post=1592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.activo.ca\/wp-json\/wp\/v2\/tags?post=1592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}