Lesson5Lec DataSecurityAwareness
Lesson5Lec DataSecurityAwareness
LESSON 5:
PHYSICAL SECURITY
Ten (10) of the most essential security measures you should implement:
A better solution than the log book is an authentication system incorporated into the locking devices, so
that a smart card, token, or biometric scan is required to unlock the doors, and a record is made of the
identity of each person who enters.
A video surveillance camera, placed in a location that makes it difficult to tamper with or disable (or
even to find) but gives a good view of persons entering and leaving should supplement the log book or
electronic access system. Surveillance cams can monitor continuously, or they can use motion detection
technology to record only when someone is moving about. They can even be set up to send e-mail or cell
phone notification if motion is detected when it shouldn't be (such as after hours).
Disconnect and/or remove computers that aren't being used and/or lock the doors of empty
offices, including those that are temporarily empty while an employee is at lunch or out sick.
Equip computers that must remain in open areas, sometimes out of view of employees, with
smart card or biometric readers so that it's more difficult for unauthorized persons to log on.
Don't overlook the fact that some workers may back up their work on floppy disks, USB keys, or
external hard disks. If this practice is allowed or encouraged, be sure to have policies requiring that the
backups be locked up at all times.
Also think about the physical security of documents that workers print out, especially extra copies or
copies that don't print perfectly and may be just abandoned at the printer or thrown intact into the trash can
where they can be retrieved. It's best to implement a policy of immediately shredding any unwanted printed
documents, even those that don't contain confidential information. This establishes a habit and frees the end
user of the responsibility for determining whether a document should be shredded.