{"id":1549,"date":"2022-01-19T10:10:12","date_gmt":"2022-01-19T10:10:12","guid":{"rendered":"https:\/\/www.argentxcyber.com\/blog\/?p=1549"},"modified":"2022-01-19T10:10:12","modified_gmt":"2022-01-19T10:10:12","slug":"physical-security","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/01\/19\/physical-security\/","title":{"rendered":"Cybersecurity &#8211; 11 Important Physical Security Tips for Business"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<span data-contrast=\"none\">There is a psychological comfort that comes with knowing your keys are physically safe and sound in your pocket. Your keys protect what you\u00a0value: Your documents, your home sound system or electronics, furniture, and collections that you curated and saved up so hard to get. You surely could not afford to lose all of that! Where would you even start if you did?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><b><span data-contrast=\"none\">Insider Threat Perspective<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Physical security at the workplace is a big part of cybersecurity, so much so that robust cyber-physical systems\u00a0by 2025 is a major\u00a0prediction\u00a0by\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/articles\/the-top-8-cybersecurity-predictions-for-2021-2022\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\"><span style=\"color: #333399\"><span style=\"color: #0000ff\">Gartner<\/span><\/span><\/span><\/a><span data-contrast=\"none\">. It&#8217;s\u00a0an extra layer of protection that can be employed and engrained in company culture. Ensuring your assets are safe, passwords secure, and creating an overall environment where you can protect your data is like the\u00a0house\u00a0keys\u00a0you make sure\u00a0are\u00a0safe and sound in your pocket.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When it comes to physical security at a workstation\u00a0<\/span><span data-contrast=\"none\">regarding\u00a0the team or business premises itself<\/span><span data-contrast=\"none\">, we get into Insider Threat Perspective. Here, you get to look at any point where data can be obtained and take steps to ensure only authorized personnel access them.\u00a0Physical security should be just as crucial as access management systems. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Even the most\u00a0robust security\u00a0software measure\u00a0can be compromised if\u00a0appropriate\u00a0physical security\u00a0measures\u00a0to protect your business aren&#8217;t\u00a0in play.\u00a0For example, you can have a pass\u00a0phrased password with a potent mix of characters, but it all goes down the drain\u00a0if you write it on a sticky note or notepad for others to access!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It is essential to note that not all actors are malicious threats.\u00a0Most\u00a0people\u00a0won&#8217;t\u00a0wake\u00a0up and set\u00a0out to aid in a security breach; most are accidental insider threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b><span data-contrast=\"none\">Physical\u00a0Security\u00a0Awareness\u00a0in the Workplace:<\/span><\/b>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<div id=\"attachment_1550\" style=\"width: 322px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1550\" class=\" wp-image-1550\" src=\"https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-150x150.png\" alt=\"Cybersecurity - Physical Security Measure\" width=\"312\" height=\"312\" srcset=\"https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-150x150.png 150w, https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-440x440.png 440w, https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-120x120.png 120w, https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-540x540.png 540w, https:\/\/www.argentxcyber.com\/blog\/wp-content\/uploads\/2022\/01\/Untitled-design-13-240x240.png 240w\" sizes=\"auto, (max-width: 312px) 100vw, 312px\" \/><p id=\"caption-attachment-1550\" class=\"wp-caption-text\">Avoid exposing your passwords on sticky notes.<\/p><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<ol>\n<li><span data-contrast=\"none\">There are no sticky notes with credentials to any service or point of entry to any device. A strong password is no good if everyone has access to it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Make sure all sensitive and critical data is backed-up.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Shred all\u00a0documentation that is no longer in use\u00a0to ensure they don&#8217;t get into the wrong hands.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">When leaving your workstation for the day, make sure all proprietary hardware\u00a0and documentation\u00a0are\u00a0locked away. Treat all work devices as sensitive to be safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">When you&#8217;re leaving for a short break, make sure you lock your work computer screen or smartphone.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Beware of shoulder surfing, especially when dealing with personal work at your station.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Report broken doors, windows, and locks to relevant personnel.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Don&#8217;t leave doors ajar. Yes, a smoking break or a quick call may take a few minutes, but those are more than a perpetrator requires to gain unauthorized access to the premises.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">You can also note to report any suspicious activity or packages to relevant personnel. It could make all the difference in preventing a breach.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00a0If you have a badge you use to enter your workplace, use it for yourself exclusively, and it would be best not to allow people to tail-gate off it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Times New Roman\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\">\u00a0Finally, follow your company&#8217;s data policies and staff training, especially with\u00a0<span style=\"color: #0000ff\"><a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2020\/09\/07\/why-identity-and-access-management-is-essential-for-organizations\/\" style=\"color: #0000ff\">identity and access management<\/a><span style=\"color: #000000\">.<\/span><\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\" style=\"font-size: 16px\">These measures will ensure that accidental and malicious threats are at bay as members of a workforce. <\/span><span data-contrast=\"none\">It&#8217;s not all about the human factors. There are others to consider to be monitored to create a buffer and help prepare for recovery easier. These factors may include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Natural disasters: It&#8217;s essential to have an awareness of the power of Mother Nature and ensure that necessary preparations are made just in case.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Physical location: Maintenance of the business&#8217;s physical site by ensuring your facility is as safe and conducive for your hardware as you make it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">Physical security in the workplace is the unsung differentiator that could make all the difference when it comes to protecting your corporate &#8216;keys&#8217; and keeping them in your cybersecurity pocket.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A robust cybersecurity strategy should take these factors and create necessary measures if any of them happens.\u00a0<\/span><a href=\"https:\/\/argentxcyber.com\/contact\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">Contact us<\/span><\/span><\/a><span data-contrast=\"none\">\u00a0today, and we will help you with that!<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]There is a psychological comfort that comes with knowing your keys are physically safe and sound in your pocket. Your keys protect what you\u00a0value: Your documents, your home sound system or electronics, furniture, and collections that you curated and saved up so hard to get. You surely could not afford to lose all of that! [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1551,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,20],"tags":[],"class_list":["post-1549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-strategy"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1549"}],"version-history":[{"count":7,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1549\/revisions"}],"predecessor-version":[{"id":1558,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1549\/revisions\/1558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1551"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}