Nothing says there's a hole in your security like someone walking off with your servers. You could spend millions of dollars on access lists, firewalls, USB tokens, virus scanners, VPNs, passwords and patches to secure your network from online invasions, but . . .
Nothing says there's a hole in your security like someone walking off with your servers. You could spend millions of dollars on access lists, firewalls, USB tokens, virus scanners, VPNs, passwords and patches to secure your network from online invasions, but none of those will protect you from offline attacks.

Physical security is essential. It prevents your machines from being stolen, damaged or taken offline by someone flipping the power switch, and it restricts physical access by an adversary who might want to attack your network.

We examined two ways of monitoring and restricting physical access: networked cameras and door locks. As you decide which devices are best for your environment, keep in mind that there are a hundred ways into a location. You need to consider every angle, just as an intruder would do.

The link for this article located at SecurityPipeline is no longer available.