Category: Physical & Human Security Management

18.4	– Theft and Locks Picking

Hardware Theft (Laptop/Hard disk/CD/DVD/USB Drives) Hardware theft is referred to as the act of stealing computer equipment such as CD, DVD, USB drives, hard disk or laptop. Unfortunately, it is very tricky to prevent theft for one piece or set…
18.3 – Physical Security Checklist

Nowadays, physical security is big business. According to market research, the hardware sector of the industry alone is worth about $36 billion and is estimated to grow at a compound yearly cost of 15 percent for the next decade. Meanwhile,…
18.2	– Planning and Executing

Planning & Executing Physical Security Test Developing a physical security policy for your company requires planning. Without appropriate planning, there are chances that execution is doomed to fail. Buying alarms, padlocks, and CCTV cameras without recognizing the strategic areas and…
18.1 – Physical Security Threats

Common Physical Security threats Today, physical security is easily overlooked, with network security breaches streaming all over the headlines. Computer and networking systems have always added more significance when companies have planned their security approaches. Yet, it is physical security…
18.0	– Physical Security

Well, most people think about bars, locks, alarms and uniformed guards when they think about security. While these countermeasures are by no means the only protections that require being measured when trying to protect an information system, they are definitely…