Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud.

The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council’s task is to provide a diverse range of services to the 350,000 residents residing across the area. It is committed to improving its performance, while ensuring value for money and serving a key part of this is the provision of good quality housing that meets the highest possible standards.

Ensuring safety and security of residents

In addition to carrying out property allocation, repairs, rent collection, homelessness services and estate management, Ealing Council is responsible for ensuring the security and safety of the tenants living in its 300+ housing blocks.

As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system"

Daljit Gill, an Electrical Services Manager at Ealing Council commented, “When it comes to administering our multi-site housing portfolio, Ealing Council recognizes the advantages that access control technology brings in terms of our ability to effectively access information, issue and configure key fobs and check occupancy status.

He adds, “As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system, which currently comprises around 1,100 doors and 500 controllers.

PAC Residential Cloud

Over the last few years the cloud has proven to be a game changer in the way access control technology is designed, configured and used. The PAC Residential Cloud leads the way in allowing organizations to remotely manage and monitor their access control systems.

Meanwhile, the PAC controllers, which are being used as part of the Ealing Council’s access control system, utilize the general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network.

Key fob management and remote diagnostics

Sam Flowers, Regional Sales Manager at PAC GDX, explains “Daljit and his team can address technical issues, deal with key fob management, examine diagnostics, view system status, set and unset a system, and gain access to event logs and reports, all from a remote location.

Without the cloud, any problems and issues would need to be dealt with by office-based individuals"

Sam adds, “Without the cloud, any problems and issues would need to be dealt with by office-based individuals, which is obviously restrictive and can lead to a delayed response. We provide a full online training program to help customers get the best out of their systems and also offer full technical support.

Asked on how the PAC Residential Cloud makes his day to day working life easier, Ealing Council’s Daljit Gill responded by stating, “I can address connection issues, manage the system and troubleshoot from wherever I happen to be, using my PC, tablet or smartphone. Not only is this convenient, it also saves me a huge amount of time, as I don’t have to go into the office to log-in.

Fully auditable system

He adds, “Two of my colleagues also have permission to use the system remotely, although we could share access with up to 15 administrators if required, with each person only given access to information that relates directly to their role.

Daljit further said, “One of the main features of the system is that it is fully auditable, meaning that any activity can be monitored in real time and traced directly back to a specific user via their unique password.

Adherence to GDPR and strong data protection policy

Ealing Council strictly adheres to the General Data Protection Regulation (GDPR) and has implemented a strong data protection policy. PAC Residential Cloud is hosted with The Bunker, a trusted PAC partner, whose UK data centers are located in former nuclear bunkers and certified to the ISO 27001 standard for information security management.

If an alert is activated, measures can then be taken to deactivate a specific key fob"

PAC Residential Cloud also offers Ealing Council some less obvious benefits. Sam Flowers comments, “The data collected by the access control system can be used to issue an alert if a resident’s key fob hasn't been used during a specific period, identify patterns of behavior that could suggest illegal activity, flag-up if someone is subletting a property or even detect if a tenant is using a cloned key fob.

Sam adds, “If an alert is activated, measures can then be taken to deactivate a specific key fob. Furthermore, the PAC Residential Cloud has also helped Ealing Council adopt a business as usual approach during the coronavirus pandemic by limiting physical interaction, while still enabling a prompt and effective response.

Fully IP-based access control system

As well as enjoying the operational advantages of the PAC Residential Cloud, Ealing Council is also planning to advance its transition to a fully internet protocol (IP) based access control system by upgrading to PAC’s 512DCi digital networkable access controllers.

Daljit Gill concludes by stating, “Installing the PAC 512DCi’s will allow us to maximize operational effectiveness through our investment in the PAC Residential Cloud. We will also be able to utilize PAC’s high frequency OPS MIFARE DESFire EV1 readers, which have been tested to meet Advanced Encryption Standard (AES) 128 bit compliance. This will further reduce the risk of key fob cloning and ensure that our tenants benefit from improved levels of security.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

What Are The Positive And Negative Effects Of COVID-19 To Security?
What Are The Positive And Negative Effects Of COVID-19 To Security?

The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact will it have on 2021?

Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More

Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.