Menu
INSIGHT: Security 101... Physical security

INSIGHT: Security 101... Physical security

While most IT security focuses on technology, network connectivity, firewalls, antivirus, and patching, you cannot overlook the importance of physical security.

While most IT security focuses on technology, network connectivity, firewalls, antivirus, and patching, you cannot overlook the importance of physical security.

It doesn’t mean that you should hire bodyguards or enrol in martial arts classes, but it does mean that your staff travelling with business IT resources should be aware of their surroundings and take basic precautions to safeguard the equipment and data in their care.

Here are some of these basic physical security best practices:

Situational awareness

Users should maintain situational awareness of their surroundings at all times and pay attention to potential threats.

They should not talk loudly on the phone or with colleagues about sensitive topics when others are within earshot.

They should not pull out their phone and pay more attention to it than to walking down the street or standing at a train platform.

They should not set up their laptop where someone can easily grab it and run off, and they should not travel alone in ‘sketchy’ areas.

Maintain control

There will be times when users cannot maintain direct physical control of IT resources, such as when their laptop goes through the X-ray machine at the airport.

But they can maintain visual contact with their equipment and ensure that they are not letting their laptop go through the X-ray machine until they are able to go through the metal detector too.

Users should also ensure that any portable media that is not directly connected to their computer and within sight is either in their pocket, or put away out of sight in their bag, which must remain within their control. It only takes a second for someone to grab a USB key and walk off with it.

Don’t provide anyone with the opportunity to grab something of yours while you are not looking.

Encryption

Accidents will happen. Thefts occur too. By encrypting all data on all portable storage and laptop hard drives, when something does grow wings and flies away, at least the sensitive data stored on the hardware will not be readily accessible to the new ‘owner’.

Make sure you use strong encryption, a very strong password, and you don’t leave the password written down on a Post-It note that flies away with the stolen goods.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags ICT industryGFI Software

Featured

Slideshows

Meet the leading customer-centric Microsoft channel partners

Meet the leading customer-centric Microsoft channel partners

Microsoft honoured leading partners across the channel following a year of customer innovation and market growth in New Zealand. The 2018 Microsoft Partner Awards recognised excellence within the context of the end-user, spanning a host of emerging and established providers.

Meet the leading customer-centric Microsoft channel partners
Reseller News launches new-look Awards at 2018 Judges’ Lunch

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Introducing the Reseller News Innovation Awards, launched to the channel at the 2018 Judges’ Lunch in Auckland. With more than 70 judges now part of the voting panel, the new-look awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors.

Reseller News launches new-look Awards at 2018 Judges’ Lunch
Show Comments