Physical security equipment advances have been hindered by misconceptions and cost. Historically, security controls were mainly seen as being disconnected and it was generally believed that anything contained within an actual building was safe from being attacked by cyber-criminals. However, the increased trend towards remote network access via endpoint devices, the emergence of infected USB drives (that can be plugged into a server), and the increased sophistication of malware, means that physical barriers are no longer sufficient to protect network data.

Image Credit

Almost half of businesses in the UK were hit by a cyber-attack or breach of their computers in 2016, according to research from the Department for Culture, Media and Sport –

Walls are not enough

Physical attacks can disrupt cyber-networks and cyber-attacks can have physical consequences. Many organisations, including the Department For Homeland Security in the USA), are looking at merging their cyber and physical security infrastructures. Integrating physical security with cyber-security gives IT security departments greater control and a better insight into employee behaviour and patterns, enabling them to identify vulnerabilities and how to fix them. There are still a number of industries and businesses that are particularly vulnerable to physical attacks. For example, intruders who access power substations may be able to hack into servers and transportation systems and oil and gas pipelines are potentially vulnerable to physical attacks that can turn cyber.

Image Credit

If you are looking for advice to help deal with the increasing danger of cyber-attacks or want to know more about endpoint security, take a look at the website of a specialist in endpoint Security, today.

Endpoint devices

The fact is, more and more companies are allowing their employees to connect to the network via devices such as tablets, mobile phones, and laptops. The security of these devices is crucial to all organisations’ business and endpoint security management with an integrated approach to deal with this and ensure that the devices meet set criteria before being given access to the company network, data and resources.

This type of approach is vital to protect existing data, should a device be lost/stolen, protecting the system from being exposed to malware and other viruses. The demand for IP-based, physical security solutions is constantly growing. However, with each additional device that is deployed and connected online, the risk increases.