Security and Why It’s Important

Security and Why It’s Important

Importance of Security

One of the most important and basic components a company needs are security training. Security awareness training is all about teaching your colleagues and employees to understand the risks and potential threats around.

Protecting important data, confidential information, networks, software, equipment, facilities, company’s assets, and personnel is what physical security is about. There are two factors by which the security can be affected. First attack by nature like a flood, fire, power fluctuation, etc. Though the information will not be misused, it is very hard to retrieve it and may cause permanent loss of data. Second is attack by the malicious party, which includes terrorism, vandalism, and theft.

The Advantages of Security

There are many advantages when it comes to security. First is perimeter security that includes mantrap, fences, electric fences, gates and turnstile, safe locks with keys that are hard to duplicate and badges are necessary for verifying the identity of any employees.

It is important to set up any surveillance in places that won’t expose it or let the attacker tamper with it, safeguard any vulnerable device and protect the portables, by securing back ups in safe places where an attacker will not be able to reach. In an emergency situation such as a fire or an explosion you will need to carry out the correct control method that can help to save some of the important things in the workplace. By enforcing a bold set up this allows your workplace to stay adamant and lowers the risk of losing any assets, data or equipment.

By having layers of security, this helps any thieves or criminals to bypass through the security in place to gain their objective. This is a positive movement as it becomes harder for the criminal to accomplish their mission. With the various methods and cost-effective equipment out there it is easy to keep your business or property safe from intruders. Some of the recommended security equipment includes:

  • Intrusion detector
  • CCTV, smart cards
  • Fire extinguisher
  • Guards
  • Suppression systems
  • Intrusion alarm
  • Motion detectors
  • Physical access
  • Chain link fence
  • RFID tags
  • Barbed wire and much more

Why Do We Need Security

When it comes to protecting your business there are many security threats which could breach your businesses personal and sensitive documentation. Some of the common physical security threats include:

Tailgating

This occurs when someone who doesn’t work for the business or have access takes advantage of an employee who does. This happens when an intruder sneaks into a protected zone with a person or a group without anyone in there’s knowledge. A tailgater will follow an unsuspecting employee, an employee will unlock a door to a secure area but aren’t observant enough to realise someone is following; allowing the intruder to enter the restricted zone.

Common examples are:

  • When a security guard or employee gives access to an attacker who claims to have forgotten his key
  • When an attacker disguises himself as a technician and then convinces a security guard/employee to let him come in through a door that leads to a security area
  • When an attacker approaches a door that leads to a security area, carrying a large, heavy-looking object, such as a big cardboard box, and politely asks a security guard/employee to open and hold the door for him

Dumpster Diving

As the title suggests this is when an intruder goes through a company’s trash in hunt of information that may be helpful for refining a company’s strategy for a potential attack. Often what can be found in bins is usually combined with other information.

When an intruder rummages through your rubbish, they are genuinely looking for data such as; network configurations, access documents, discarded storage media, information on employees; all sensitive information that might be used in a social engineering scenario.

If ‘Dumpster Diving’ is posing a threat to your business then there are effective measures you can take to remove any access to intruders this includes; shredders, locks and the encouragement of your staff following the correct procedures.

Social Engineering

Social engineers’ prey on human nature and good will, for example a con artist will gain the trust of an inside person using deception techniques. A social engineer will try have ownership of the following traits; desire to aid, a propensity to boast, and general lack of vigilance. In other words, social engineering attacks attempt to bypass IT and physical security controls by targeting humans.

Peering Over Someone’s Shoulder

A con artist can sometimes prefer to take the risk to get closer to a targeted person to look over their shoulder and read what is written on their screens. If you are looking to minimise this risk by placing over a filter their screen can help to discourage an over lookers’ eyes. Another good idea is to mask any passwords, this can be done by using your arm to cover when you type. Another piece of advice is to not use any corporate computers in public places, try sitting with your back against the wall and keep your device angled.

Conclusion

Overall a company needs administrative, technical and physical control to run their company smoothly and effectively. Security is usually overlooked, the main points of incorporating security within the workplace is to protect. The foremost important feature of security is to safeguard employees since they are the most important asset to the company.