Physical Security Enhances Information Security


By having physical access to data centers, servers, backup tapes, laptop computers, flash drives, etc., employees can inadvertently, or on purpose, damage or destroy sensitive data. Contractors, service providers, and other personnel may also be granted physical access to sensitive data.

Altius IT recommends that a physical security review be performed on a regular basis:

  • The first step in the physical security review is an inventory of your assets
  • Determine who has physical access to the assets
  • Evaluate access and the risk to the organization
  • Make changes as appropriate

Altius IT's network security audit evaluates your physical controls over data centers and server rooms.  In some cases, it may make sense to bring in an outside consultant who specializes in this area, both to protect your sensitive assets plus ensure that your organization is minimizing its legal liability risks. The International Association of Professional Security Consultants (www.iapsc.org) has many members that can assist you.



Security Blog menu  

Tags: network security | information security | cybersecurity | physical security

 


Certified Auditors

Certified Information Systems Auditors
Altius IT's auditors are certified to audit your systems and issue reports and opinions on your security. We help you identify, manage, and reduce your risks. Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets

For a full list of our certifications please visit our About Us page.