Physical Security
Cybersecurity also includes protecting physical documents and building security.
Physical Security
Cybersecurity begins with strong physical security. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.
Free Consultation
How to protect equipment and paper files
Store Securely
When paper files or electronic devices contain sensitive information, store them in a locked cabinet or room.
Limit physical access
When records or devices contain sensitive data, allow access only to those who need it.
Send reminders
Remind employees to put paper files in locked file cabinets, log out of your network and applications, and never leave files or devices with sensitive data unattended.
Keep Stock
Keep track of and secure any devices that collect sensitive customer information. Only keep files and data you need and know who has access to them.
How to protect data on your devices
Require complex passwords
Require passwords that are long, complex, and unique. And make sure that these passwords are stored securely. Consider using a password manager.
Use multi-factor authentication (MFA)
Require multi-factor authentication to access areas of your network with sensitive information. This requires additional steps beyond logging in with a password — like a temporary code on a smartphone or a key that’s inserted into a computer.
Limit login attempts
Limit the number of incorrect login attempts allowed to unlock devices. This will help protect against intruders.
Encrypt
Encrypt portable media, including laptops and thumb drives, that contain sensitive information. Encrypt any sensitive data you send outside of the company, like to an accountant or a shipping service.
Train your employees
Shred documents
Always shred documents with sensitive information before throwing them away.
Erase data correctly
Use software to erase data before donating or discarding old computers, mobile devices, digital copiers, and drives. Don’t rely on “delete” alone. That does not actually remove the file from the computer.
Promote security practices in all locations
Maintain security practices even if working remotely from home or on business travel.
Know the response plan
All staff should know what to do if equipment or paper files are lost or stolen, including whom to notify and what to do next. Use Data Breach Response: A Guide for Business for help creating a response plan. You can find it at FTC.gov.
Reach out to us for a free consultation with a Cybersecurity expert.
Contact Us