Home / Reviews / Cyber Defence for physical security

Cyber Defence for physical security

Physical security equipment advances have been hindered by misconceptions and cost. Historically, security controls were mainly seen as being disconnected and it was generally believed that anything contained within an actual building was safe from being attacked by cyber-criminals. However, the increased trend towards remote network access via endpoint devices, the emergence of infected USB drives (that can be plugged into a server), and the increased sophistication of malware, means that physical barriers are no longer sufficient to protect network data.

Image Credit

Almost half of businesses in the UK were hit by a cyber-attack or breach of their computers in 2016, according to research from the Department for Culture, Media and Sport

Walls are not enough

Physical attacks can disrupt cyber-networks and cyber-attacks can have physical consequences. Many organisations, including the Department for Homeland Security in the USA), are looking at merging their cyber and physical security infrastructures. Integrating physical security with cyber-security gives IT security departments greater control and a better insight into employee behaviour and patterns, enabling them to identify vulnerabilities and how to fix them.

There are still several industries and businesses that are particularly vulnerable to physical attacks. For example, intruders who access power substations may be able to hack into servers and transportation systems and oil and gas pipelines are potentially vulnerable to physical attacks that can turn cyber. Of course, if you feel that you have been the victim of a cyber attack and need legal advice, why not contact Ascot solicitor companies like Parachute Law.

Image Credit

Endpoint devices

The fact is more and more companies are allowing their employees to connect to the network via devices such as tablets, mobile phones, and laptops. The security of these devices is crucial to all organisations’ business and endpoint security management with an integrated approach to deal with this and ensure that the devices meet set criteria before being given access to the company network, data, and resources.

This type of approach is vital to protect existing data, should a device be lost/stolen, protecting the system from being exposed to malware and other viruses. The demand for IP-based, physical security solutions is constantly growing. However, with each additional device that is deployed and connected online, the risk increases.

 

About Russell

Check Also

What is a Thorough QT Study?

Thorough QT/QTc (TQT/QTc) studies are used to assess the cardiovascular effects of a non-antiarrhythmic drug. …

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.