• blog-eleven .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 1: Hands Free Access Control Solutions

    Read More
  • blog-eight .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 2: Video Analytics

    Read More
  • blog-five .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 3: Visitor Management

    Read More

Is a Lack of a Security Staff keeping you from Properly Securing your Data?

Jun 1, 2018 3:07:08 PM


Data security is a top priority for consumers and business owners. Cyber, physical, and electronic security measures are key.

While the IT department is primarily responsible for data security, physical and electronic security measures to protect data are often the responsibility of the security staff. However, some organizations don’t have an onsite security team. For these organizations, we recommend the following strategies:

Equipment Location and Storage

Data is vulnerable anywhere that an IT network can be accessed. Uncontrolled access is, therefore, a significant risk. Server rooms contain not only the servers on which data resides but also the network switches that allow data to flow across the organization.

Server equipment is usually stacked inside tall cabinets within a dedicated server room or mixed-use utility space. We recommend that the physical location of this equipment be fully access controlled, requiring personnel to present credentials for authorized access. A dedicated server room is ideal. However, if this is not possible, server racks and equipment cabinets can be secured separately within a room to access both the room and the server rack or cabinet. This would allow a maintenance team, for example, to access the room’s electrical system without compromising the server rack and equipment cabinets inside of the room.

The credentials will also provide an access log, detailing when the room and/or rack was accessed and by whom. When combined with video surveillance, the access log can be compared to recorded footage. Video surveillance can be used to capture an event or confirm the user of a credential. If credential misuse is a concern, biometric credentialing is recommended to ensure authorized access.

Offices

Because data transmission occurs on a network, offices can be just as vulnerable as an unsecured server room. We recommend that offices and larger workspaces be fully access controlled as well, supported by a video surveillance system for event and log confirmation. Like a mixed-use utility space, larger workspaces may be secured with multiple layers of credentialed access to ensure authorized access to sensitive workstations or personal offices.

Main Lobby and Building Entry Points

In the absence of an onsite security staff, perimeter security is critical. We recommend that personnel be required to present credentials for automated building access. Visitor access should be requested using an intercom system, supported by video surveillance, within a secure lobby vestibule. By requiring a manual entry request, a visitor can be vetted and properly escorted during their visit. They may also be provided temporary visitor credentials to ensure that their movement throughout the building is fully controlled and monitored.

Solution

The goal of a security assessment and site survey is to uncover potential threats at schools, buildings, and campuses of all sizes. Ultimately, these solutions can help integrate a variety of technologies as part of a plan that works in unison to help secure occupants, protect valuable assets, and assist in preventing physical access to sensitive areas.

Contact the Vision team to discuss security options for your organization.


Topics: Cyber Security