Questions? Contact Us

 

Latest News

Featured News & Events

What is gained from Cybersecurity and Physical Security Convergence?


It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your most valuable assets, both in business and at home.

First Things First

You absolutely need both. You wouldn't protect your computer from malware and not lock the front door of your house. And on a business level, you can't address PCI compliance, by simply encrypting cardholder data, setting up secure systems and controlling digital access to data. You also must protect access the physical components containing cardholder data such as storage media, point-of-sale devices, laptops, data centers, and buildings and rooms that contain cardholder data, etc.

Over time, it became clear that linking physical security with logical security was the way forward, whether we're talking about the Ring phenomena, which essentially turned the doorbell into an Internet of Things, WiFi home security system, or the badge system to get into an office or building.Linking logical with physical offered businesses several opportunities for added value in the areas of reduced risk, improved efficiencies and reduced operational costs.

Where's the Value?

A starting point for any security strategy designed to reduce risk is a risk assessment, which ultimately identifies the most important assets that need to be protected and where they are located. For example, if you're a business that has cardholder data to protect, one element of your security system must be controlling access to the data at both the physical and logical level. To address this, you can incorporate multi-factor authentication which means to access the data and the resources it's stored on, you must have something – such as a badge to enter the building and the data center itself. You also must have something you know – such as a password that grants access to the network holding the cardholder data.

This blend of physical and logical security greatly reduces risk of data loss by strongly controlling access to the information on multiple levels with a single system.

The convergence of physical and logical security also can greatly improve operational efficiencies. One of the best examples of this is the provisioning and deprovisioning process for employees. With single source of truth to manage identities, employees can get everything they need to be productive for the business quickly – whether it's a badge for building access or access and authorization to use various applications and IT systems within the company. More importantly, when there is a termination or a change in roles, that employee's access can be revoked or changed quickly to help ensure security of both the physical and the digital / logical assets.

Finally, operational costs can be streamlined when physical and logical security blend. For example, security operations teams can be cross-trained and duties shared; it's easier to negotiate budgets and have a holistic view of short-term needs and what could be moved to the next budgeting round; and information sharing can improve insight for a "big picture" view that could be more informative and telling than if the physical and logical systems were siloed.

If you examine your security initiatives, you're sure to see a convergence of physical and logical. Take a closer look and assess what you're doing to make sure you're getting all the value you can from where you've blended security. Questions? Need a consultation? Contact us.  

Tips for Optimizing PCI Compliance
ZZ Servers Announces Phase One of Scalable Redunda...

Related Posts

 

Tag Cloud

QSA network shared secure hosting security circles management ICANN Hackers recovering data exchange David Zendzian Compliance email accounts VPS Servers hosting control panel ipad DEF CON ZZ Servers cyber monday Presentation Server Mangement PCI Data Security Standards World Backup Day data protection follow.The HIPAA Privacy Rule black friday multi-factor authentication dsbl IT Solutions cli Web Hosting CentOs search passwords personal information Health Insurance Portability PCI BSides PCI DSS 3.2 embedded Cybersecurity Business Solutions healthcare solutions Business Planning business solitions PCI compliance Shmoocon protect data intrusion detection compliant hosting cloud infrastructure Internet Corporation Scalable Redundant Cloud Infrastructure Xen data breach bash health care providers IT Services smartphone support IT TiaraCon Credit Card Security physical security information technology TLS Medical Records Hosting Firetalk HIDS Home Depot Breach Cloud Computing cyber businesses Accountability Act IT solutions data privacy Windows Health Care Cybersecurity computer networks Vulnerability permissions PCI Service Provider sender policy vyatta router firewall filter security PCI HIPAA members area INFOSEC spoofing password credit card Control Panel kerio vps iphone Car Hacking Reports HIPPA openssl cell phone email Ubuntu Internet infrastructure Geekend Charleston safe computing Internet eCommerce Solutions Medical Solutions shared server Continuous Monitoring amazon ec2 teensy DRP dss HIPAA assesment log files phishing Debian SSL Payment Card Industry credit card payment blackberry Email employee training Zendzian business community Positive Customer Impact cybersecurity arduino social engineering activesync cyber liability insurance spam trends credit cards stolen PCI Hosting phishing attacks Online Business Interworx-CP command line mail server compliance caller-id eCommerce IT security ZZ Servers Co-Founder apache education GDPR cloud Las Vegas Information Technology OSSEC Small Business anti virus change infrastructure Security cyber monitoring pci complliant hosting Linux cyber protection small business motivation backup solutions Business Solutions PCI Audit security Announcement Healthcare Records lamp Cybersecurity cyber security InterWorx business solutions computer security Alarm shared folders business Sysadmin Domani Names computing in the cloud vulnerability scanning physical IT services Assigned Names PCI Compliance logical security HIPAA solutions shared hosting Credit Cards National Cyber Security Awareness Month video windows 7 spf malicious software HIPAA Solutions PCI Solutions Disaster Recovery Plan qsa two factor authentication