One of the buzzwords you might be hearing lately concerning cybersecurity is “physical security.” Using a device to secure your computer or network might seem strange in the age of cloud storage and blockchain. Nonetheless, these devices are becoming more prevalent.
Physical security comprises both technical and administrative elements. It helps companies protect their assets, including but not only IT infrastructure and servers. These measures range from “smart cards” and following PCI (Payment Card Industry) and ISO (Information Organization for Standardization) standards, to physical security gates and surveillance cameras. As technology continues to evolve, physical security devices are going to become imperative to an organization’s success and their clients and customers’ safety.
Physical Security Advantages
Today, it’s not difficult for a skilled hacker to access a server or cloud and steal important or private information to use as they see fit. When there are more steps or many layers of security, a hacker is less likely to be able to complete their mission. Not only are they less likely to complete their mission but knowing that they have to take additional steps to acquire the information they want is likely to deter them from even trying.
Types of Physical Security
PCI Standards
PCI (Payment Card Industry) is a set of global security standards used by all major credit cards for all entities making transactions. Essentially, they are security best practices, and whether you process cards or not, if you follow these 12 steps, provided by the University of Iowa, you will better equip your organization to prevent hackers or any unwanted access.
- Install and maintain a firewall configuration to protect cardholder data.
- Do not use vendor-supplied defaults for passwords and security parameters.
- Protect stored cardholder data.
- Encrypt transmission of cardholder data across open, public networks.
- Use and regularly update anti-virus software.
- Develop and maintain secure systems and applications.
- Restrict access to cardholder data by business need-to-know.
- Assign a unique ID to each person with computer access.
- Restrict physical access to cardholder data.
- Track and monitor all access to network resources and cardholder data.
- Regularly test security systems and processes.
- Maintain a policy that addresses information security for all personnel.
ISO Practices
The (ISO) International Organization for Standardization represents international standards systems for various issues. The ISO publishes a set of information security standards that, “...specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements are generic and are intended to be applicable to all organizations, regardless of type, size or nature.” If your company isn’t already following ISO standards, make it a priority to get on board.
Smart Cards
Similar in concept as requiring a password when starting up a company computer, using a smart card verifies a person has proper permissions to access the facility. Smart cards contain microchips with dynamic passwords, payment processing, certificates, and biometrics.
Biometrics
One of the newest tech trends in company security management is the use of biometrics, which is identification by face, fingerprint, or iris scan. According to Spiceworks, a network for people in IT, nearly 90% of businesses will use biometric authentication by 2020. According to CNN Money, Biometrics can include controversial but effective advanced user behavior tracking. Companies can incorporate technology that runs in the background and captures user’s movements and routines, such as how they type on the keyboard, or how they scroll and move their cursor. Understandably, people are wary of these new tracking and identification tools. Spiceworks' also reported that only 10% of IT workers think biometrics are secure enough to be the only form of authentication.
RFID Tags
Radio Frequency Identification technology uses radio signals to identify, track, sort, and detect objects. Each tag contains a unique identification code and can be searched and matched. RFID tags can prevent theft in stores, in an office, or in a lab setting.
Security Gates, Locks, and Surveillance Cameras
Physical security, like security gates and doors that require access cards, prevent things like vandalism and theft, which can cost a company millions of dollars. In addition to security cameras, sometimes there’s nothing better than placing a physical person at a main point of entry. These are some of your basic and first line of defenses to help mitigate vandalism and theft.
There’s still a great need for physical security in an increasingly digital world. Physical security keeps the digital world safe from those who wish to steal, harm or misuse valuable and private information. Additionally, physical security provides a sense of safety to employees, an invaluable peace of mind for management.
IMAGE: Pixabay / CC0 Public Domain