BLOG

Bridging the Gap Between Physical Security and Cybersecurity: Why Businesses Need to Take a Unified Approach to Addressing Risks

Bridging the Gap Between Physical Security and CybersecurityBridging the Gap Between Physical Security and Cybersecurity

Physical and digital security have typically been viewed as separate domains, with separate systems, teams and strategies solely focusing on one or the other. Strong locks and surveillance cameras kept guests safe, while firewalls and antivirus tools protected sensitive data behind the scenes. In today’s hyper-connected building environments, however, those boundaries no longer exist, and security threats can now readily cross into and impact both physical and digital worlds. Technology has woven the physical and making cybersecurity a vital part of any serious physical security strategy.

From hotels and casinos to senior living and healthcare facilities, buildings have become intricate digital ecosystems where cybersecurity and physical protection measures should always be simultaneously considered to identify any potential vulnerability risks.

Motives Behind Compromising Physical Systems

While some cyberattacks may be motivated by a desire to steal data, others might take place to reduce the physical security abilities of onsite areas or to disrupt operations for simple malicious intent. Examples can include hacking a building’s surveillance cameras to monitor staff actions and identify potential opportunities to exploit. For buildings such as hotels or apartments using online-enabled door locks lacking effective encryption, hackers could bypass the need for room keys to steal valuable belongings.

Risks do not stop at individual devices which can instead be used to gain a foothold within a network to breach other systems. Something as seemingly inconsequential as an unprotected smart thermostat can be used to move laterally across a network which can then provide access to property management platforms, financial data, customer profiles and more.

 Strengthening Security Through a Unified Strategy

With expectations for connected environments and their associated benefits being increasingly unavoidable, the only effective solution to maintaining security is to no longer view a device as just a device, but instead as a networked component with the same potential vulnerabilities as a server or email inbox.

That means all physical technology should be evaluated through a holistic cybersecurity lens. Properties must ensure that each device uses the latest encrypted communication standards when sharing data and network access with other devices and systems. Equally important is working with vendors able to provide a transparent roadmap over how their devices can be updated alongside other evolving technologies and potential threats.

The Role of Network Architecture

Device-level protections are only the beginning of adopting an effective physical and digital security strategy. For some industries and larger building environments, one available option is to leverage network segmentation by deploying VLANs. While typically sharing the same physical network infrastructure, each VLAN operates in isolation and broadcasts a separate Wi-Fi signal. More sensitive systems such as door locks, surveillance cameras, staff safety devices and payment processing services should operate on their own dedicated VLAN that is segregated from guest Wi-Fi and general business operations. This approach limits the potential for lateral network movement, ensuring that a breach in one system doesn't cascade across the property and lead to more severe harm.

Properties should also implement strong internal monitoring and detection tools that can alert staff to suspicious activity before it escalates. Firewall policies, virus/malware software and anomaly alerting platforms all play a vital role in stopping attacks early.

Multi-Factor Authentication

Another essential component of maintaining security is the use of strong authentication, especially for devices that are either sensitive themselves or that share network access with other more sensitive systems. Administrative dashboards for access control systems, surveillance platforms, and financial accounting interfaces are some examples that should ideally require multi-factor authentication. Too many breaches occur because critical systems can be accessed with a single password, or worse, with default vendor credentials that were never changed.

Practicing Security as a Team Sport

Many vulnerabilities are introduced not through technical flaws, but through human error, such as clicking on a phishing link, downloading unverified files or using unsecured Wi-Fi to access a critical system. Employee training should therefore always form a core part of any security strategy. Training programs should cover best practices in password protection, how to recognize social engineering attempts, and what to do when something seems off. By adopting a training program, as many as 80 percent of organizations acknowledged that their staff were more resilient against phishing scams.

A New Definition of What ‘Secure’ Means

As properties adopt smarter technologies and interconnected systems, the definition of implementing effective security must evolve to reflect the full range of potential threats. True security now depends on the ability to think holistically, treating physical and digital defenses as part of the same ecosystem. Businesses and building operators that adapt accordingly will not only be safer but will also be better positioned to earn the trust of their customers, guests, tenants and staff.

Dr. Chris Spencer

Director & Head of Global Product Security

Dr. Chris Spencer is The Director & Head of Global Product Security With over 20 years of experience in cybersecurity, he leads the company’s global product security program, embedding security by design, supply chain assurance, and compliance with international standards across all solutions. His focus is on ensuring customers and partners can trust that ASSA ABLOY products are resilient, secure, and built to withstand evolving threats.

Before joining ASSA ABLOY, Chris served as Chief Information Security Officer in the connectivity sector, where he guided organizations to achieve ISO 27001 certification and advanced industry-wide security standards. He remains active in global cyber resilience and threat intelligence initiatives, helping to shape best practices that benefit both the industry and customers worldwide.

Subscribe to our Newsletter

Fill out the form below to subscribe to our newsletter. By doing so, you'll not only be the first to discover what's next on our blog but also join a community passionate about the innovation and tradition driving the hospitality realm forward.