Three practical ways to harden cybersecurity in connected access control, starting at the controller.