Securing systems for tomorrow: Navigating the PSTN shutdown

March 9, 2026
Securing systems for tomorrow: Navigating the PSTN shutdown

In an exclusive interview with SJUK, Ian Moore, Head of Technical at HKC Security, discusses the PSTN shutdown and how organisations can future-proof their security systems.

Can you tell us a bit about your role as Head of Technical and your background in the security industry? 

My journey in the security industry started more than 25 years ago.

The time I spent in the field gave me a clear understanding of how systems perform in real environments and where things don’t always work as they do on paper. 

When I joined HKC in 2009, it was within the technical support team, helping installers tackle the challenges they were seeing on site.

Over time, I began working closely with product development, feeding back insights into design and capability priorities. That practical grounding has shaped the way I think about product strategy and technical leadership today. 

As Head of Technical, I now oversee the technical assurance of our portfolio, work with standards and compliance bodies and ensure that what we build truly reflects what the market needs, not just on paper, but in operation.  

The PSTN shutdown is a perfect example of where that field perspective matters. This isn’t a telecoms footnote, it’s a change with real implications for resilience, continuity and risk management. 

HKC promotes dual-path, all-IP signalling – can you explain what that is and why it’s considered best practice going forward? 

At its simplest, dual-path, all-IP signalling means having two independent communication routes between a security system and an alarm receiving centre, both of which use Internet Protocol rather than analogue telephone lines. 

One path might be a fixed broadband or Ethernet connection, the second could be a cellular data link. If one path goes down, the other still carries the signal. That redundancy is why we talk about it as best practice. 

Beyond redundancy, IP-based signalling gives you visibility, faster signalling, remote supervision and easier diagnostics, things that analogue simply can’t deliver. In the context of a PSTN withdrawal, it becomes even more important. You no longer have an analogue fallback, so your primary and secondary paths both need to be on modern, resilient infrastructure. 

If you were still out in the field as a service engineer today, how would you be approaching customer upgrades? 

First, I’d be auditing systems to identify where analogue dependencies still exist. Many users don’t even realise their alarm system is tied to a PSTN line, it’s just ‘always worked’ for them. 

Then, I’d talk to customers in plain language about what’s changing and why it matters. 

It’s not about selling a new product, it’s about managing risk. If connectivity fails because the network no longer exists, that monitored alarm system effectively becomes blind, regardless of how good the detection hardware is. 

On the technical side, I’d be looking for solutions that integrate with existing infrastructure where possible and minimise on-site disruption. Time on site is costly and clients are often hesitant to embrace changes or disruptions. Seamless, low-impact upgrades that maintain continuity of operations tend to be better received. 

Planning is also key. Reactive upgrades after a failure are always more disruptive than proactive migration. 

From your experience, why do you think so many analogue systems are still in use today? 

That’s a really important point and it’s easy to assume it’s ignorance or complacency, but that’s not the full story. PSTN lines were extremely reliable for decades.

If a system has worked without issue, users and even some security teams simply didn’t see urgency around migration. There’s also the question of awareness.

The messaging about the PSTN shutdown has been uneven, partly because telecoms regulation and network evolution aren’t topics that filter easily into everyday security operations. In a large organisation, responsibility for alarm signalling might be split across departments, which dilutes accountability. 

Finally, cost and disruption concerns play a role. Security budgets are competitive and if a system is perceived as working, upgrades can be deferred until they become unavoidable. Today, that trade-off no longer exists, the network itself is changing beneath the system. 

What conversations are you having most often with installers and security leaders right now about the PSTN shutdown? 

There’s a palpable shift in the tone of conversations. Six to twelve months ago, it was uncertainty and “Is this really happening?”, whereas today, it’s about timelines, solutions and accountability. 

Security leaders are asking how quickly they need to act, what standards they should be meeting and how to align upgrades with broader organisational risk strategies. Installers are focused on practicalities, such as how to retrofit IP signalling without full system replacements, how to manage customer expectations and how to avoid unnecessary site visits. 

There’s also increasing dialogue around integration. As intrusion detection, access control and video systems converge on IP networks, people are thinking holistically about connectivity rather than treating signalling as an isolated detail. 

From your perspective, what should security teams and organisations be doing right now to prepare for the move to an all-IP network? 

The first priority should be understanding where risk exists by conducting a clear audit of your installed base, identifying systems that still rely on analogue signalling and assessing the impact of connectivity loss. 

Next, engage stakeholders. PSTN isn’t purely a security issue, it intersects with IT, compliance, facilities and risk management functions. Bringing these groups together early helps ensure that upgrades are aligned with wider organisational policies and infrastructure plans. 

Skills development is also crucial. As security systems adopt more IP techniques, teams need confidence with networking concepts, remote diagnostics and cloud-enabled tools. These aren’t fringe skills anymore, they’re central to daily operations. 

And finally, document decisions, risk assessments and upgrade plans. From a governance and insurance perspective, having a record of the steps taken to mitigate a known change enhances accountability and reduces uncertainty. 

What are the real compliance or insurance risks for organisations if analogue systems aren’t upgraded in time? 

This is where the conversation must become tangible for senior security stakeholders. If a monitored alarm system loses connectivity simply because the network it relied on no longer exists, it may no longer meet the conditions set out in a risk assessment, contractual security requirements, or insurance policies. 

Many insurers now expect evidence of resilience and redundancy in signalling. If a claim is made after an incident where signalling was lost due to PSTN withdrawal, the absence of a documented mitigation strategy could complicate coverage. 

From a compliance standpoint, failing to address a known infrastructure change that impacts system performance can be seen as a governance gap. Organisations are more comfortable defending proactive risk management than explaining delayed action after a failure. 

How can security teams future-proof both their installations and their operations as the UK moves to an all-IP network? 

Future-proofing is as much about mindset as technology. On the technology side, adopting resilient, dual-path IP signalling gives organisations a more reliable foundation. IP-based systems offer greater visibility, remote manageability and scalability compared with analogue approaches. 

But future-proofing also means aligning with broader organisational strategies for digital infrastructure and risk management. Security has historically operated somewhat separately from enterprise IT, but that way of working is no longer realistic. 

Effective security now requires collaboration with network teams, alignment with cybersecurity policies and integration with broader operational resilience frameworks. 

Finally, teams should embrace connectivity as an enabler rather than a vulnerability. Connected systems provide data, analytics and visibility that can inform better decision-making.

The PSTN shutdown is a catalyst for this transformation, but the real value comes from how organisations leverage connectivity to improve security outcomes. 

Looking ahead, is there a silver lining in all of this disruption? 

I believe there is. Change always creates uncertainty, but it also drives clarity around priorities. The PSTN shutdown forces us to confront where risk exists, to rethink how we manage connectivity and to integrate security more deeply with organisational strategy. 

Systems that adapt now will not only maintain continuity of monitoring, they’ll be positioned to take advantage of digital tools and resilience frameworks that support more intelligent, responsive security operations. 

Seen in that light, this isn’t simply a technical upgrade. It’s a significant turning point that invites security leaders to strengthen systems while building capability for the future. 

HKC, part of ASSA ABLOY 

Established in 1990, HKC is a trusted brand in both Ireland and the UK providing electronic wired and wireless intruder alarm equipment to Professional Installers. 

HKC manufactures a complete range of feature rich intruder equipment with consistent programming, excellent technical support and installers have access to the SecureComm Cloud Solution supporting both End User and Installer Apps.    

Read Next

Security Journal UK

Subscribe Now

Subscribe
Apply
£99.99 for each year
No payment items has been selected yet