Is there a missing link in your access control system?

EKA Cyberlock
Thursday, 02 April, 2020


Is there a missing link in your access control system?

On entry to most of the government or office buildings you are confronted with a host of access control initiatives to govern who is allowed and who is not allowed access. Be it the presentation of your card to a reader to open a turnstile, activate the lift or trigger an automatic door, access is controlled in an efficient and easily managed way, and our security programmed brains believe that all is good.

But this raises a question: How many of these doors/lifts/turnstiles have a mechanical key override?

The answer is many. Not all, but many.

This then raises further questions:

  • Are the mechanical keys secure?
  • Are they stored in a secure place and are not lost?
  • Also, are they secure from attack and duplication (remembering that many keys can be visually read and even reproduced from a photograph)?

The problem is that as soon as they are in a person’s hand, keys can be compromised by copying, duplication or even 3D printing.

Our observation is that at many sites, extremely effective and costly access control systems are installed. These systems are hugely effective in monitoring and controlling access to the building, however, many of these systems have a very basic weak point that allows the whole system to be compromised. The chink in the armour is that they are fitted with a conventional mechanical cylinder.

This cylinder has no audit trail and can be in many cases mechanically manipulated (picked). Added to which any access to a key by an unscrupulous person can result in it being read, impressioned (in the way of an impression into a soft material) or photographed and 3D printed.

So now what? A solution is available. Install an electro-mechanical key system such as EKA CyberLock. The cylinders are opened with CyberKeys. Both are managed using software in the same way as an access control system. The management software allows access to be granted when and where, or simply timed out or even revoked when required. CyberKeys are programmed through communicators such as a smart app and Bluetooth or a 20-key vault cabinet. The entire system can be audited and, to make it even simpler, can potentially be integrated with your existing access control system.

EKA CyberLock makes a range of cylinders to suit most common locks in the Australian market. For our latest case studies across major office buildings, communication towers, roads and traffic control boxes and much more, visit www.ekacyberlock.com.au/case-studies

To find out more or continue the discussion contact us at sales@ekacyberlock.com.au or on 1300 722 311.

Related Sponsored Contents

The cyber battleground

Jake King, Director of Threat Intelligence at Elastic, talks with us about the evolving cyber...

Why trust is essential when delivering public services

When it comes to digital transformation within the public sector, nothing is more important than...

Taking control: Why organisations must protect passwords with a comprehensive password management strategy

Here are five steps that security teams looking to improve how they safeguard workforce...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd