- About Us
- Industry Solutions
- Contact Us
As physical access control system technologies continue to advance, so do the capabilities of the attacker. While access card cloning can be effective, entry isn’t always gained with this method alone. Attackers are beginning to move beyond the card to the technology that supports it. Physical access control systems have advanced capabilities that rely heavily on computer networks to properly function. Because of this reliance it is essential to evaluate the security posture of the PACS supporting architecture beyond initial deployment and transition.
Securicon has released a free Physical Access Control Systems (PACS) Security Checklist designed to provide guidance in hardening the PACS environment from network and computer-based attacks.