London South East prides itself on its community spirit, and in order to keep the chat section problem free, we ask all members to follow these simple rules. In these rules, we refer to ourselves as "we", "us", "our". The user of the website is referred to as "you" and "your".
By posting on our share chat boards you are agreeing to the following:
The IP address of all posts is recorded to aid in enforcing these conditions. As a user you agree to any information you have entered being stored in a database. You agree that we have the right to remove, edit, move or close any topic or board at any time should we see fit. You agree that we have the right to remove any post without notice. You agree that we have the right to suspend your account without notice.
Please note some users may not behave properly and may post content that is misleading, untrue or offensive.
It is not possible for us to fully monitor all content all of the time but where we have actually received notice of any content that is potentially misleading, untrue, offensive, unlawful, infringes third party rights or is potentially in breach of these terms and conditions, then we will review such content, decide whether to remove it from this website and act accordingly.
Premium Members are members that have a premium subscription with London South East. You can subscribe here.
London South East does not endorse such members, and posts should not be construed as advice and represent the opinions of the authors, not those of London South East Ltd, or its affiliates.
And now a brand new article just added to Grosvenor Technology's website: and it's another excellent one, this time on access control, further highlighting the cutting edge leadership of the company's solutions:-
"Insights
Card Cloning – A Real Threat to Modern Building Security
Thankfully, innovation has led to the development of encrypted solutions that provide the security that all environments can benefit from.
Chris Wrench
Senior Product Manager
One of the greatest security risks to your buildings and estates is that of card cloning. Sadly, technologies have existed for years that allow the swift copying of legacy cards and it is only becoming easier. Recently there has been a spike in card cloning using a range of devices, from specialist machines through to the versatile Flipper Zero. For security professionals responsible for access control systems, card cloning presents significant issues that seem insurmountable.
Thankfully, innovation has led to the development of encrypted solutions that provide the security that all environments can benefit from.
The Worst Case Scenario
You don’t need much imagination to consider the potential problems that card cloning creates. Systems installed to allow only approved personnel access can be circumvented – and the reasons for doing this are always nefarious. And it affects access control systems used in so many areas, from offices to university student accommodation to hospital buildings.
It’s not the fault of the security professionals; often, those partaking in illicit access have cutting-edge technology at their disposal. However, it is the responsibility of security professionals to meet this threat with equal firepower. And that means understanding and using advances in access control credential technology to combat the issue.
There are some security firms guilty of adopting a ‘carry on regardless’ attitude, which only serves to leave their customers vulnerable. With a solution so readily available, there’s no excuse for not adapting. So why are so many firms lagging behind?
The Problem with 40-Year-Old Technology
Keycard and fob technology has been around for decades, and many systems that are installed across the UK have existed for more than 40 years. And because these systems work well enough day-to-day, it can seem like an upheaval – financially and administratively – to make a change. There’s a mindset of ‘if it ain’t broke, don’t fix it’, but in this case, remaining ignorant of the risks that relying on the same basic unencrypted RFID communication presents can make you question the integrity that drives the decisions.
And we’re not just talking about the boot-on-the-ground access control companies; some of the leading names in manufacturing are guilty of pressing ahead with technology that can be breached. ..."
https://www.grosvenortechnology.com/insights/card-cloning-a-real-threat-to-modern-building-secur
"Card Cloning – A Real Threat to Modern Building Security
... Encryption and Actually-Secure Security
At Grosvenor Technology, we work with the newest systems that incorporate high-frequency communication with strong MIFARE DESFire EV2 and EV3 levels of encryption. Data is transmitted between card and reader in a secure envelope with encryption that cannot be easily cloned, and thus truly provides the access control and security that is much needed. We have a range of options to upgrade existing building door security systems from ageing infrastructure, resistant to the best attempts of even the most dedicated hacker.
With the top-of-the-range EV2 and EV3 chips, you can expect;
Enhanced Security – evaluation assurance level 5+ certification
More Flexible Memory – unlimited simultaneous application use
Greater Read Speed & Range – varies on card type, but minimum expected distance is 10cm
Proximity Check – protects against relay attack
Of course, upgrading in this way doesn’t just improve the reliability of door security; it also brings your estate access control up to current specifications, offering seamless management over your site that includes CCTV, wireless locking, fire and intruder alarms, lift control, and properly tracked occupancy access.
Building Security for a New Era
It should be unacceptable to all of us for building security to be left open to the threat of card cloning and the subsequent easy access for intruders – especially when there is no need to do so. Contact Grosvenor Technology today to discuss incorporating the latest technology.
To find out more about our leading access control solution, click here."
https://www.grosvenortechnology.com/insights/card-cloning-a-real-threat-to-modern-building-security/
Just added to NWT's website, a superb new article on access card cloning, that builds on on a 1st. December 2023 Grosvenor Technology article on the same subject:-
"How to protect against access card cloning
Businesses must fortify their building security to protect against the evolving threat of card cloning"
https://newmarksecurity.com/insights/
"Card Cloning – A Real Threat to Modern Building Security
Thankfully, innovation has led to the development of encrypted solutions that provide the security that all environments can benefit from."
https://www.grosvenortechnology.com/insights/card-cloning-a-real-threat-to-modern-building-security/
"Insights
How to protect against access card cloning
The threat of card cloning casts a long shadow in the building security landscape. As technology advances, so do malicious actors’ techniques to compromise access control systems. This article delves into the pervasive card cloning issue, explores the industry landscape, and sheds light on how Grosvenor Technology can work with your organisation to upgrade your building security approach.
Card cloning remains a substantial security risk, with hackers exploiting vulnerabilities in existing proximity ID-based readers. The shift from 125 kHz prox technologies to smart 13.56 MHz credentials marked an industry response to documented security vulnerabilities. However, even these technologies face challenges as hackers swiftly find ways to clone prox credentials.
Additionally, employee access card copying presents a significant threat vector. Attackers can obtain access card information through various avenues, such as social media, observing employees in common areas, or within the company premises.
The repercussions of cloned access control cards are severe, ranging from security breaches to potential harm to the building, company, staff, or data. A security breach could lead to reputational damage and financial losses. Recognising these dangers, organisations are urged to prioritise security measures promptly. ..."
https://newmarksecurity.com/insights/how-to-protect-against-access-card-cloning/
"How to protect against access card cloning
... What are EV2 and EV3 chipsets?
At Grosvenor Technology, we work with the newest systems that incorporate high-frequency communication with strong MIFARE DESFire EV2 and EV3 levels of encryption. Here is a summary of the technologies and how they can bolster building security and reduce the chances of card cloning:
MIFARE DESFire EV2: Offering advanced encryption algorithms and mutual authentication protocols, EV2 chipsets provide a formidable defence against cloning and unauthorised access attempts. With support for multi-application capabilities, EV2 cards enable access control systems to accommodate diverse credentials and functionalities within a single card, ensuring enhanced data integrity and confidentiality.
MIFARE DESFire EV3: Building upon the foundation of EV2, MIFARE DESFire EV3 chipsets introduce additional security layers to fortify access control systems further. Incorporating diversified keys and secure messaging protocols, EV3 chipsets thwart sophisticated hacking attempts and prioritise compatibility and interoperability, facilitating seamless integration with existing infrastructure. With enhanced speed and efficiency, EV3 cards streamline authentication and data transfer processes, empowering organisations to maintain a robust security posture in the face of evolving threats.
Bluetooth-based access control
In response to the security vulnerabilities associated with traditional proximity ID-based readers, the industry is witnessing a significant trend towards mobile Bluetooth-based access control solutions. The adoption of smartphones for access control credentials has become a game-changer, offering higher encrypted credentials tied to the smartphone.
Bluetooth is seamlessly integrated with smartphones that users already utilise for various tasks. Bluetooth’s familiarity and widespread application make it an attractive choice, eliminating the hassle of remembering keys or carrying proximity cards. The encrypted nature of Bluetooth credentials provides a robust defence against cloning and hacking concerns associated with traditional proxy credentials.
Adopting Bluetooth Low Energy (BLE) in mobile access control systems ensures efficient and high-performance technology. BLE-based access control systems leverage a Bluetooth-enabled reader wired to the access control panel and the credential holder’s smartphone. This deployment is user-friendly, with a one-time internet connection required during the initial setup, making it a secure and convenient option. ..."
https://newmarksecurity.com/insights/how-to-protect-against-access-card-cloning/
"How to protect against access card cloning
... Selecting the right BLE reader is crucial for effective access control. Features such as easy credential distribution, customisation options, and support for BLE and traditional cards and fobs enhance security and flexibility. BLE readers that allow customisation through a smartphone’s built-in fingerprint scanner/face unlock contribute to an additional layer of protection.
How to bolster access card security
The rise of card cloning poses significant dangers to organisations, ranging from security breaches to reputational damage. Recognising the urgency to fortify access control cards against cloning, Grosvenor Technology offers these practical tips to enhance security measures.
• Use modern, secure cards: Shift from outdated MIFARE Classic cards to more secure options like MIFARE DESFire, equipped with EV2 and EV3 chipsets.
• Leverage security features: Make optimal use of security features available in different access control cards, focusing on secure cryptography and automatic activation of security features.
• Use programmed cards: Programming cards add information, such as credential data, to the card’s chip, enhancing card security.
• Embrace mobile access control: Move away from traditional cards and adopt mobile access control, utilising smartphones for secure and encrypted credentials.
• Employee education: Fostering a culture of security awareness and implementing proactive measures are essential to combating the threat of employee access card copying. By addressing vulnerabilities, organisations can bolster their defences against unauthorised access and protect the integrity of their access control systems.
• Regular inspections: Regular access card checks serve to identify anomalies or unauthorised replicas, acting as a deterrent to potential attackers while reinforcing the significance of access card security among employees.
Adopting advanced access control technologies becomes paramount in the face of evolving security threats. Grosvenor Technology’s commitment to innovation aligns with industry trends, ensuring that access control systems remain resilient against the growing menace of card cloning. As organisations navigate the complex landscape of security, the shift towards mobile Bluetooth-based solutions emerges as a beacon of enhanced security and convenience.
Grosvenor Technology offers tailored solutions for organisations seeking to fortify their access control systems and stay ahead of emerging threats. Speak to our experts today to safeguard your premises against card cloning."
https://newmarksecurity.com/insights/how-to-protect-against-access-card-cloning/