Yes, you need to take appropriate precautions to guard against cyber-threats to your data. But, real-world (physical) hazards – some low-tech threats, some no-tech – haven’t disappeared.
Computer closets and locked cabinets can help protect server and storage gear. But, your employees use equipment that’s vulnerable to being unprotected, like small-form-factor desktop computers, notebooks, tablets, smartphones, pocket hard drives, flash drives and more. According to a Forrester report,1 on average, 26 percent of global information workers are accessing sensitive data, such as customer information and IP from devices other than dedicated work computers.
There are a number of ways company data can be breached or otherwise compromised that have nothing to do with hacking. Here are some potential risks and ways you can help defend against them:
1. Physical access: Employee keycards can help restrict and log access to an entire facility, and within it, to offices, computer closets or rooms, etc. Video recording can also be implemented for monitoring access.
2. Power problems: Surges, spikes, power interruptions and outages can easily alter or destroy data. To prevent this, ensure you are up to date with UPS's solutions and related power protection.
3. Environmental problems: Fire, water, heat, cold, smoke and fumes can easily cause your data to be damaged. Solutions start with climate-conditioned computer closets or rooms, with computer-safe fire suppression, along with environmental monitoring and alerting.
4. Physical theft: Hardware like notebooks, tablets and external hard drives can all too easily be whisked into a miscreant’s briefcase or bag. Remind employees to store and lock valuable assets in secure places.
5. Digital theft: As you may know, data can be quickly and easily stolen digitally by malicious hackers, either via flash drive, pocket hard drive, file-transfer or even email. Ensure you’re using IT management tools to restrict USB port activity or implements a DLP (Data Leakage Prevention) system.
6. Multi-function printers (MFPs): MFPs while present, many “attack surfaces.” For starters, remind employees to check that they haven’t left originals or copies behind. For shared devices, implement keyfob or other security access – and don’t let fax or print jobs pile up. Finally, make sure MFP hard drives are secured against unauthorized network or physical access.