Physical Security Audit
Without Physical Security Your IT Security is Compromised
If a hacker ever gains physical access to your systems, this can mean "checkmate" for your organization. Physical access makes compromising your organization much easier. In addition to protecting your network from threats outside the firewall, a major part of your protection relies on the physical security of your facilities.
Most organizations focus on threats that come from outside their company. They're very surprised when they are attacked from the inside. These types of attacks could include:
- Someone pretending to be a delivery person and gaining access to your facility.
- An employee getting into your data center and causing problems.
- People tailgating behind your authorized employees (having an authorized employee go through a secure door and the intruder walking in right behind them).
- Someone intentionally or unintentionally disrupting your connection to the Internet such that you lose the ability to send and receive e-mail, use web commerce, or access any other services you need.
- A person slipping valuable assets into the trash, whether it be a paper document or some type of electronic media, and coming back later at night to retrieve the valuable asset from the waste bin outside of your building.
- Someone breaking into your organization and stealing one or more computers, possibly a chief executive's laptop or even one or more of your servers. What do you do? Chances are this type of loss can be devastating to your organization!
A Physical Security Audit will reveal many vulnerabilities and you will say to yourself, "WOW! I never thought of that!" Unrecognized physical security vulnerabilities are why more and more regulations, and perhaps the larger clients you serve, now require regular Physical Security Audits.
The Foster Institute's Crime Scene Investigator
The Physical Security Audit of your facilities is performed by The Foster Institute’s Crime Scene Investigator. His primary goal is to help prevent you and your organization from becoming a victim of crime.
His qualifications include:
- More than ten years of crime scene investigation experience.
- More than 2,100 cases investigated related to crime scenes.
- Such a high success rate that he has been engaged to provide training to more than 700 participants through 6,000 hours of training.
- Physical Security Audits for The Foster Institute's clients in order to identify inexpensive solutions to vulnerabilities the clients did not even realize existed.
He possesses in-depth knowledge of:
- Undercover street level operations
- Burglary investigation
- Lock defeating methods
- Security alarm systems
- Closed circuit TV video surveillance systems
- Police response methods
- Social engineering techniques
- Corporate environments
The Foster Institute's Physical Security Audit deliverables include:
- Knowing you can rest easier because your physical security is better both inside and outside of your building(s) perimeter.
- Feeling more confident regarding your security alarm configuration, video camera system, and other detective controls.
- Finding out if your locks at all entry points are sufficiently pick-resistant and secure. The Physical Security Audit examines many other preventative controls.
- Feel more prepared for events such as a bomb threat, an angry person with a gun, lengthy power failure, severe weather events, and many other unforeseen threats to your organizational success.
- Knowing that more than 200 physical security points are examined at your facility.
- Being in compliance with regulations that require physical security audits.
- Having the ability to show documented physical security audit results. This documentation puts your clients and prospects more at ease and demonstrates how you take physical security seriously—sometimes putting you ahead of your competition.
The physical security auditor only needs access to whoever handles your facility management or anyone who can walk around your property with him. Since they are already so busy, it is just fine if your IT professionals are not involved in the Physical Security Audit process unless they have time and want to be involved.