The Universal Log-on Vulnerability

Company-wide installer passwords are a cause for concern

Existing network access management technology can be put to good use for protecting physical security systems, and leading companies have extended their good information security practices to cover networked physical security systems. Standalone deployments can benefit from good network security practices as well, and they are always feasible to implement.

Download a helpful guidance document on access management for electronic physical security systems from the Global Security Operations 2015 event website:


Note: Write to Ray about this column at


Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. He is founder and publisher of The Security Minute 60-second newsletter ( For more information about Ray Bernard and RBCS go to or call 949-831-6788. Mr. Bernard is also a member of the Subject Matter Expert Faculty of the Security Executive Council (