The First Rule, Encrypt
When implementing a card-based system, protect yourself
By Scott Lindley
President, Farpointe Data
As seen in Security Today
It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond. Indeed, one of the security challenges frequently heard surrounds denying hackers, cyber-punks and associated bad actors from using the access system as a gateway to an organization’s sensitive IT network.