IT Support Help Desk (602) 412-5000 | Sales (602) 412-5025

Thief picking lock on server roomWhile you have been focused on cyber-security best practices, which are of course imperative, do not overlook the security of your physical office items. Your paper files, server room, and office computers are all susceptible to damage and theft too. How susceptible is your business to a physical breach?  

Physical Security Scams 

Be aware of your surroundings. If you work at an office building that requires key card access, and allow a visitor to enter without permission, can you trust them? Tailgating is when a criminal follows an employee into a building so they can enter without a key. This is like inviting a robber into your home. Believe it or not, there are bad actors that will rob you when you least expect it.  

Consider a policy that does not allow unaccompanied visitors in your office space. Lock cabinets that contain sensitive documents. Shred confidential papers when you no longer need them. 

Check your locks, security hinges, door latches. It is easier than you might think for a thief to break in. 

Environmental Damage 

We may not be worried about hurricanes or tornadoes in Arizona, but environmental damage can happen. One of the most common causes is overheated equipment. Total Networks includes an environmental monitoring device for our clients’ server rooms to help monitor temperature and humidity levels. Keep your servers and computer equipment elevated off the floor, so in case a pipe or the air conditioning unit leaks, the equipment does not sit in standing water.  

And should your equipment have a power outage, invest in uninterruptible power supplies, surge protection and redundant power as appropriate. 

Confusing Cables 

If your network closet is cluttered, it can be a tripping hazard. Or it may be difficult to troubleshoot an issue if it is difficult to determine which cable is connected to what device. 

Compliance Requirements 

Most regulatory compliance guidelines include many administrative protocols, including physical security. Have a written physical security policy that addresses the access and protection of your physical equipment and files.