Physical Security: every network is at risk
When it comes to network security, the vulnerabilities of physical assets such as servers, hard drives and desktop computers are often overlooked.
Is your physical security putting you at risk?
- Server rooms
Lots of businesses still have a server room. If you have one, how secure is it? Who has authorisation to access the room? Without some type of security, such as locks on the doors and surveillance footage, you will never know who has entered your server room, or their purpose for visiting.
Allow the wrong person inside and they can do an enormous amount of damage. Physical assets can be sabotaged. Information can be loaded to a
third-party device. Backdoors can be activated to allow remote viewing, or worse, remote control.
- Equipment damage
It would be rare for equipment to remain undamaged in the event of a break-in. Damage can occur when intruders attempt to either upload or
download onto a server or desktop computer. It can also result from a deliberate act of vandalism. Damaged equipment takes time to repair or
replace, and this can be very costly. Doing business without the equipment can be nearly impossible.
- Equipment theft
Some break-ins result in equipment theft. If an intruder visits your business, it’s unlikely they will take your servers. However, desktop computers, hard drives and tablets are attractive due to their size and value.
The costs associated with replacing stolen equipment can be substantial. However, dealing with the consequences and the costs that come with
having the data stolen with the equipment can be even more detrimental.
- Password access
The value of passwords shouldn’t be underestimated. They can give criminals access to extremely valuable information. Passwords can be
gained from stolen computers that had their password saved onto it or if the computer was logged in. They can also be taken from paperwork
and documents where passwords are stored.
- Reputation cost
Your business network extends way beyond the confines of your office, it includes the connections you have with customers and other
businesses. When there is a physical security breach, it not only impacts your business, it impacts your reputation and your relationships.
This can be made worse if the breach is vague and you cannot be certain of the impacts. ‘I don’t know’ doesn’t offer
your customers and business partners much comfort.
A final word…
Just as cyber security can stop cyber criminals, it is possible to take steps to protect yourself from physical security breaches. Look for weaknesses and fix them. Assess internal and external threats and work to minimise or mitigate them. And, if nothing else, ensure locks are installed correctly!
If you need any assistance with your cyber security strategy or any help around cyber security please call us on 1300 478
or email us at firstname.lastname@example.org.
About the Author
Geoff Stewart is a highly experienced and skilled Technology Director at Surety IT. His knowledge is based on years of industry experience
having created customised, stable, well performing systems both for multi-national companies in the UK and Australia and Surety IT
Surety IT can help you create the right system to enhance your business, ensuring you know how it is right for you and how to use it. We will tailor a solution to suit your needs with leading systems, local support and more, building your vision for a more flexible and capable business.