{"id":3801,"date":"2021-12-17T12:40:21","date_gmt":"2021-12-17T11:40:21","guid":{"rendered":"https:\/\/www.digitalid.co.uk\/blog\/?p=3801"},"modified":"2024-11-14T00:30:44","modified_gmt":"2024-11-13T23:30:44","slug":"risks-of-outdated-access-control","status":"publish","type":"post","link":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/","title":{"rendered":"The Risks of Using Outdated Access Control Methods"},"content":{"rendered":"\n<p>Several organisations use outdated access control methods to gain access to the building, day in and day out.<\/p>\n\n\n\n<p>Companies often implement physical <a href=\"https:\/\/www.digitalid.co.uk\/access-control\">access control<\/a> systems to improve security measures, yet many remain unaware that their legacy systems are not secure and could be at risk.<\/p>\n\n\n\n<p>Outdated access control measures dominate the industry.<\/p>\n\n\n\n<p>Here&#8217;s the problem: times have changed. But for many organisations, their access systems haven&#8217;t.<\/p>\n\n\n\n<p>Access requirements are constantly evolving, and companies need more from their physical access control systems. However, most companies are stuck with decade-old processes in place, with many unaware of the associated risks.<\/p>\n\n\n\n<p>We&#8217;re taking a look at the potential risks of relying on outdated systems for your access control.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What are outdated access control methods?<\/h2>\n\n\n\n<p>Outdated systems consist of ageing access control technologies that have existed for several years, yet haven&#8217;t adapted to changes in the environment. As technologies are not up-to-date, outdated systems are vulnerable to security and data breaches.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Examples of outdated access control methods include:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proximity cards<\/li>\n\n\n\n<li>Magnetic stripe cards<\/li>\n\n\n\n<li>Key fobs<\/li>\n\n\n\n<li>Keypads<\/li>\n\n\n\n<li>Barcodes<\/li>\n\n\n\n<li>Older readers<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The problem with outdated physical access control systems<\/h2>\n\n\n\n<p>Like using outdated software on your computer, outdated access control technology can put you at risk. As technologies are not up to speed, they cannot deal with modern threats.<\/p>\n\n\n\n<p>For example, hackers can easily enter these systems and gain unauthorised access to files and data. This makes outdated systems less effective in protecting organisations.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Some risks of relying on outdated access control methods are:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anyone can easily clone cards using easily accessible technology<\/li>\n\n\n\n<li>Key cards and fobs are frequently lost<\/li>\n\n\n\n<li>PIN numbers for keypads are often shared<\/li>\n\n\n\n<li>Incompatible with modern card readers<\/li>\n\n\n\n<li>Difficult to source stock and reorder<\/li>\n\n\n\n<li>Not user-friendly<\/li>\n\n\n\n<li>Require extensive maintenance<\/li>\n\n\n\n<li>Cannot be remotely updated<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Outdated systems possess several security gaps that could compromise not only physical access but also sensitive data. Worse yet, if an unauthorised individual was to the premises, they could even cause physical harm.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Which technologies are at risk?<\/h2>\n\n\n\n<p>Some of the technologies at risk include:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Magnetic-Stripe-Cards.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Magnetic-Stripe-Cards-1024x819.jpg\" alt=\"Magnetic Stripe Cards - Outdated Access Control Method\" class=\"wp-image-3868\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Magnetic Stripe Cards<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paxton Net2<\/li>\n\n\n\n<li>HID Prox with Magnetic Stripe<\/li>\n\n\n\n<li>Dyestar with Hi-co Magnetic Stripe<\/li>\n\n\n\n<li>Fotodek with 2750oe Hi-Co Magnetic Stripe<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">125kHz Low-Frequency Proximity Cards<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HID Proximity<\/li>\n\n\n\n<li>HID Duo Prox<\/li>\n\n\n\n<li>HID ISO Prox II<\/li>\n\n\n\n<li>Hitag<\/li>\n\n\n\n<li>Hitag 2<\/li>\n\n\n\n<li>Salto 1k<\/li>\n\n\n\n<li>PAC KeyPAC<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/HID-iClass-Card.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/HID-iClass-Card.jpg\" alt=\"HID iClass Card - Outdated Access Control Method\" class=\"wp-image-3872\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">13.56MHz Smart Cards<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HID iCLASS<\/li>\n\n\n\n<li>HID iCLASS Smart<\/li>\n\n\n\n<li>HID iCLASS 2080 Clamshell<\/li>\n\n\n\n<li>FlexSmart MIFARE<\/li>\n\n\n\n<li>MIFARE Classic<\/li>\n\n\n\n<li>MIFARE DESfire<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Fobs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HID Prox<\/li>\n\n\n\n<li>Paxton Net2<\/li>\n\n\n\n<li>Salto MIFARE<\/li>\n\n\n\n<li>PAC Stanley Token<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>These are just some of the most popular access methods that are currently at risk.<\/p>\n\n\n\n<p>If your current access control method is on the list, it&#8217;s time to take action now. And we have the physical access control upgrade for you.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The modern, secure alternative<\/h2>\n\n\n\n<p>Implementing a <a href=\"https:\/\/www.digitalid.co.uk\/mobile-access\">mobile access control solution<\/a> solves the issues caused by outdated access systems. The modern access control system allows users to unlock doors with their phones or equivalent mobile devices. And better yet? It&#8217;s highly secure.<\/p>\n\n\n\n<p>More and more organisations are choosing to switch from legacy access systems to mobile access control, and for good reason. There are several&nbsp;<a href=\"https:\/\/www.digitalid.co.uk\/blog\/benefits-of-mobile-access-control\" target=\"_blank\" rel=\"noopener noreferrer\">key benefits of mobile access<\/a>, including strengthening security systems and improving the user experience. Therefore, it&#8217;s no surprise that the technology is proving to be a clear winner in the field.<\/p>\n\n\n\n<p>The digital process enables organisations to protect users with secure, unparalleled access to their buildings. What&#8217;s more is that security managers can remotely manage access, replacing physical credential management with cloud-based software.<\/p>\n\n\n\n<p>As one of the most dynamic access control technologies on the market, mobile access control provides users with physical and logical access from their mobile devices. With more companies realising this, many are now opting for a mobile access control solution to optimise their security systems.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Could it be time to join them? The choice is yours.<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Control-pic.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Control-pic-1024x683.jpg\" alt=\"Mobile Access Control\" class=\"wp-image-3873\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>And if you&#8217;re looking to further boost security, you could even incorporate 2-factor-authentication (2FA) into your access control protocol. 2FA involves using two or more methods to verify an individual&#8217;s identity.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Let&#8217;s see it in action.<\/h3>\n\n\n\n<p>Staff members use mobile access control to gain secure access to their building.<\/p>\n\n\n\n<p>Staff then show their&nbsp;photo ID&nbsp;cards to verify that they&#8217;re authorised to be on the premises.&nbsp;<strong>It&#8217;s a win-win.<\/strong><\/p>\n\n\n\n<p>2FA is forecast to be one of the&nbsp;<a href=\"https:\/\/www.digitalid.co.uk\/blog\/access-control-trends-for-2022\" target=\"_blank\" rel=\"noopener noreferrer\">top access control trends for 2022<\/a>, with it allowing companies to utilise multiple credentials for logical security management.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Old ways won&#8217;t open new doors<\/h2>\n\n\n\n<p>With several methods available to improve your current access control protocol, there&#8217;s no reason to stick with an outdated, unsecure system.<\/p>\n\n\n\n<p>Upgrading to a modern access control solution will undoubtedly strengthen your organisation&#8217;s overall security strategy. But simply considering an upgrade isn&#8217;t enough. Organisations must actively make plans to upgrade their physical access control systems. This is the only way to ensure complete safety and privacy protection of the building, staff and company data.<\/p>\n\n\n\n<p>Will you keep putting your organisation and its data at risk? Or will you take advantage of one of the most dynamic, logical access systems on the market? The decision is yours.<\/p>\n\n\n\n<p>Get in touch with our expert team on <strong>0800 988 2095<\/strong>&nbsp;today to learn more about upgrading your legacy access system and securing your workplace. We hope to speak to you soon.<\/p>\n\n\n\n<p>Alternatively, discover more about mobile access in our free <a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2022\/02\/Mobile-Access-Ebook.pdf\">mobile access control ebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several organisations use outdated access control methods to gain access to the building, day in and day out. Companies often implement physical access control systems to improve security measures, yet many remain unaware that their legacy systems are not secure and could be at risk. Outdated access control measures dominate the industry. Here&#8217;s the problem: [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5147,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[16,14],"tags":[],"class_list":["post-3801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-access-control","category-mobile-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Risks of Using Outdated Access Control Methods | Digital ID<\/title>\n<meta name=\"description\" content=\"Many companies unknowingly use outdated access control methods to enter their buildings. We&#039;re looking at the risks of using outdated access control systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Risks of Using Outdated Access Control Methods | Digital ID\" \/>\n<meta property=\"og:description\" content=\"Many companies unknowingly use outdated access control methods to enter their buildings. We&#039;re looking at the risks of using outdated access control systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"| Digital ID\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalidltd\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-17T11:40:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T23:30:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"931\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\"},\"author\":{\"name\":\"Adam Bennett\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\"},\"headline\":\"The Risks of Using Outdated Access Control Methods\",\"datePublished\":\"2021-12-17T11:40:21+00:00\",\"dateModified\":\"2024-11-13T23:30:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\"},\"wordCount\":906,\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg\",\"articleSection\":[\"Access Control\",\"Mobile Access\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\",\"name\":\"The Risks of Using Outdated Access Control Methods | Digital ID\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg\",\"datePublished\":\"2021-12-17T11:40:21+00:00\",\"dateModified\":\"2024-11-13T23:30:44+00:00\",\"description\":\"Many companies unknowingly use outdated access control methods to enter their buildings. We're looking at the risks of using outdated access control systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg\",\"width\":1100,\"height\":931,\"caption\":\"The Risks of Using Outdated Access Control Methods\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.digitalid.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Risks of Using Outdated Access Control Methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"name\":\"Digital ID Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\",\"name\":\"| Digital ID\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"width\":640,\"height\":196,\"caption\":\"| Digital ID\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/digitalidltd\",\"https:\/\/x.com\/DigitalIDltd\",\"https:\/\/www.linkedin.com\/company\/digital-id\/\",\"https:\/\/www.youtube.com\/user\/DigitalIDltdUK\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\",\"name\":\"Adam Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"caption\":\"Adam Bennett\"},\"description\":\"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Risks of Using Outdated Access Control Methods | Digital ID","description":"Many companies unknowingly use outdated access control methods to enter their buildings. We're looking at the risks of using outdated access control systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/","og_locale":"en_GB","og_type":"article","og_title":"The Risks of Using Outdated Access Control Methods | Digital ID","og_description":"Many companies unknowingly use outdated access control methods to enter their buildings. We're looking at the risks of using outdated access control systems.","og_url":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/","og_site_name":"| Digital ID","article_publisher":"https:\/\/www.facebook.com\/digitalidltd","article_published_time":"2021-12-17T11:40:21+00:00","article_modified_time":"2024-11-13T23:30:44+00:00","og_image":[{"width":1100,"height":931,"url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg","type":"image\/jpeg"}],"author":"Adam Bennett","twitter_card":"summary_large_image","twitter_creator":"@DigitalIDltd","twitter_site":"@DigitalIDltd","twitter_misc":{"Written by":"Adam Bennett","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#article","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/"},"author":{"name":"Adam Bennett","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512"},"headline":"The Risks of Using Outdated Access Control Methods","datePublished":"2021-12-17T11:40:21+00:00","dateModified":"2024-11-13T23:30:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/"},"wordCount":906,"publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg","articleSection":["Access Control","Mobile Access"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/","url":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/","name":"The Risks of Using Outdated Access Control Methods | Digital ID","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg","datePublished":"2021-12-17T11:40:21+00:00","dateModified":"2024-11-13T23:30:44+00:00","description":"Many companies unknowingly use outdated access control methods to enter their buildings. We're looking at the risks of using outdated access control systems.","breadcrumb":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#primaryimage","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg","width":1100,"height":931,"caption":"The Risks of Using Outdated Access Control Methods"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalid.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"The Risks of Using Outdated Access Control Methods"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalid.co.uk\/blog\/#website","url":"https:\/\/www.digitalid.co.uk\/blog\/","name":"Digital ID Blog","description":"","publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization","name":"| Digital ID","url":"https:\/\/www.digitalid.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","width":640,"height":196,"caption":"| Digital ID"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digitalidltd","https:\/\/x.com\/DigitalIDltd","https:\/\/www.linkedin.com\/company\/digital-id\/","https:\/\/www.youtube.com\/user\/DigitalIDltdUK"]},{"@type":"Person","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512","name":"Adam Bennett","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","caption":"Adam Bennett"},"description":"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post."}]}},"uagb_featured_image_src":{"full":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg",1100,931,false],"thumbnail":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method-150x150.jpg",150,150,true],"medium":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method-300x254.jpg",300,254,true],"medium_large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method-768x650.jpg",768,650,true],"large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method-1024x867.jpg",800,677,true],"1536x1536":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg",1100,931,false],"2048x2048":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Risks-of-Using-Outdated-Access-Control-Method.jpg",1100,931,false]},"uagb_author_info":{"display_name":"Adam Bennett","author_link":"https:\/\/www.digitalid.co.uk\/blog\/author\/adam-bennett\/"},"uagb_comment_info":0,"uagb_excerpt":"Several organisations use outdated access control methods to gain access to the building, day in and day out. Companies often implement physical access control systems to improve security measures, yet many remain unaware that their legacy systems are not secure and could be at risk. Outdated access control measures dominate the industry. Here&#8217;s the problem:&hellip;","_links":{"self":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3801"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3801\/revisions"}],"predecessor-version":[{"id":5473,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3801\/revisions\/5473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media\/5147"}],"wp:attachment":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}