Physical Security Enhances Information Security
By having physical access to data centers, servers, backup tapes, laptop computers, flash drives, etc., employees can inadvertently, or on purpose, damage or destroy sensitive data. Contractors, service providers, and other personnel may also be granted physical access to sensitive data.
Altius IT recommends that a physical security review be performed on a regular basis:
- The first step in the physical security review is an inventory of your assets
- Determine who has physical access to the assets
- Evaluate access and the risk to the organization
- Make changes as appropriate
Altius IT's network security audit evaluates your physical controls over data centers and server rooms. In some cases, it may make sense to bring in an outside consultant who specializes in this area, both to protect your sensitive assets plus ensure that your organization is minimizing its legal liability risks. The International Association of Professional Security Consultants (www.iapsc.org) has many members that can assist you.