By having physical access to data centers,
servers, backup tapes, laptop computers, flash
drives, etc., employees can inadvertently, or on
purpose, damage or destroy sensitive data.
Contractors, service providers, and other
personnel may also be granted physical access to
sensitive data. Altius IT recommends that a
physical security review be performed on a
regular basis:
- The first step in the physical security
review is an inventory of your assets
- Determine who has physical access to the
assets
- Evaluate access and the risk to the
organization
- Make changes as appropriate
Altius IT's
network
security audit evaluates your physical
controls over data centers and server rooms.
In some cases, it may make sense to bring in an
outside consultant who specializes in this area,
both to protect your sensitive assets plus
ensure that your organization is minimizing its
legal liability risks. The International
Association of Professional Security Consultants
(www.iapsc.org)
has many members that can assist you.
Security Blog menu
Tags: network security | information
security | cybersecurity |
physical security
|