{"id":4788,"date":"2016-06-28T09:47:33","date_gmt":"2016-06-28T14:47:33","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4788"},"modified":"2016-06-23T08:14:54","modified_gmt":"2016-06-23T13:14:54","slug":"network-security-how-to-avoid-physical-security-threats","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/network-security-how-to-avoid-physical-security-threats\/","title":{"rendered":"Network Security: How to Avoid Physical Security Threats"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/06\/network-physical-security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4791 alignleft\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/06\/network-physical-security.jpg\" alt=\"network-physical-security\" width=\"294\" height=\"294\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/06\/network-physical-security.jpg 294w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/06\/network-physical-security-150x150.jpg 150w\" sizes=\"auto, (max-width: 294px) 100vw, 294px\"><\/a>In a <a href=\"http:\/\/www.reuters.com\/article\/us-cybersecurity-ibm-idUSKBN0OC0ZE20150527\" target=\"_blank\" rel=\"nofollow\">2015 study<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> conducted by Ponemon Institute, a data security research organization, they found that the average total cost of a data breach incident was $3.8 million. In 2014, the average cost was only $3.5 million. In recent years, data breach has become increasingly common that many companies are stepping up their IT security features.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u201cMost of what\u2019s occurring is through organized crime. These are well-funded groups. They work Monday to Friday. They are probably better funded and better staffed than a lot of people who are trying to defend against them,\u201d said Caleb Barlow, vice president of IBM Security.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">When it comes to <a href=\"http:\/\/www.aim.ph\/services\/it-security-audit\/\" target=\"_blank\" rel=\"nofollow\">IT security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, many of us are concentrated on Internet-based attacks and seem to forget that IT security can be compromised with physical attacks as well. In a 2014 investigative report from <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/\" target=\"_blank\" rel=\"nofollow\">Verizon<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, researchers found that a majority of company employees committed cybercrime acts right under the noses of coworkers and during work hours. Physical security is also at the foundation of a business\u2019 IT security.<\/span><\/p>\n<p>\u00a0<\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Tips to Avoid Physical Security Threats in the Workplace<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Here are some ways companies can avoid physical security threats.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Lock Server Rooms<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Cloud-based servers are all the hype now, but many companies still use conventional server rooms. Ensure that server rooms are only accessible to authorized employees and that they remain locked.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Anyone who has access to the server room can potentially do a lot of damage to the company. So, it is important to create policies to determine access as to who, what, and when goes in and goes out.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Lock Network Devices in Server Rooms or Secure Locations<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A hacker can simply plug a laptop into network devices or use a sniper software to gather data and do damage. Network devices should also be under lock and key, either in the locked server rooms or locked rooms in a secure location.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Place the Server Room under Surveillance<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Despite policies, break-ins in server rooms are not uncommon in the workplace. It could be an <a href=\"http:\/\/www.aim.ph\/blog\/the-it-checklist-to-prevent-data-breach\/\" target=\"_blank\" rel=\"nofollow\">unauthorized access<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> or misuse of the authority given, but these incidents happen and can cost your company a lot.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Place the server rooms under surveillance and make sure the cameras are placed where it cannot be easily accessed or tampered with. You can also set up a log book, so every entry is properly documented.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Secure Workstations<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Empty workstations and offices can also be a threat. For instance, someone can easily plug in an unsecured laptop to delete information that is vital to the business.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In fact, any vacant work area that is easily accessible to the public can be a threat. The receptionists\u2019 desks are great examples as someone can easily plug his or her unauthorized device into the server and do the damage.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Secure Company Printers<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Many printers have onboard memories that can be hacked. Unauthorized employees can easily make reprints of previously printed files that contain sensitive information.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Printers should be placed in secure locations, and ensure that they are bolted down, especially if it\u2019s a portable one. This way, no one can simply walk away with it along with company information.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Add a Layer of Security to Portable Devices<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Many companies use laptops these days. However, these portable devices pose bigger threats. Unlike desktop computers, thieves can easily run off with smaller devices.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The simplest and most inexpensive IT solution is to provide employees with cable locks. Other options include the installation of motion sensing alarms or locked drawers to keep portable items secured even when employees leave their desks.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Secure the Backup Files<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Backups are important, but sometimes, many IT administrators fail to secure the backups properly. Many keep these backup files in unlocked server rooms. Like network devices, they should be under lock and key or, better yet, kept at a secure location outside of the workplace.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Many companies have policies against employees using their own external hard drives and USB drives. But, for businesses that do not have such policies, anyone with a device for saving data can run away with your backup files if they are not stored properly.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Disable USB Ports<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Many multinationals disable the USB ports in their company-issued work laptops and computer stations. This simple IT security solution ensures that no employee can transfer company data into an external device.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Improve Your Defense against Physical Security Threats<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Every day, companies are subject to internet-based and physical threats. This is why many <a href=\"http:\/\/www.aim.ph\/\" target=\"_blank\" rel=\"nofollow\">IT solutions<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> include data protection against physical security dangers, and not just the ones circling in cyberspace.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Data breach and cyber attacks are very costly incidents to companies its customers and stakeholders. These tips are easy and cost-efficient, so don\u2019t wait until the threats are knocking down your doors. Improve your defense using well-placed security features and policies.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a 2015 study conducted by Ponemon Institute, a data security research organization, they found that the average total cost of a data breach incident was $3.8 million. In 2014, the average cost was only $3.5 million. In recent years, data breach has become increasingly common that many companies are stepping up their IT security [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":4791,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-4788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4788"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4788\/revisions"}],"predecessor-version":[{"id":4795,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4788\/revisions\/4795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4791"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}