By: Stephanie Valleroy

At its core, physical security is the protection of personnel, hardware, software, networks and data from physical actions that could cause serious loss or damage.

With all the attention surrounding cyber security one begins to wonder why people aren’t taking physical security vulnerabilities of one’s network into consideration. I have been in many government buildings and have seen the physical security weaknesses firsthand. For example, on a recent site survey, I noticed the server room was an office supply closet and only protected by a key lock. Therefore, anyone with a key, master key or bump key could gain access to the closet and the network without anyone being the wiser. Since, cybercrime at an all-time high, it is important to start considering the physical security of your network. Below are a few examples to help you ramp up the physical security of your network systems:


  1. Wireless cabinet locks – If isolating server and switch equipment in a private closet or room isn’t an option; a locked server cabinet is the next best solution. Cabinet locks can be your first line of defense. Designed for server cabinets with hardwired or wireless options the locks easily integrate into an access control system. The wireless technology and access control integration make for easy and affordable installations.
  2. Access control – By adding access control to server areas, Administrators can see who is coming and going. These systems are capable of running reports to see how long a person is in the area, or if a person is staying in the area too long. Furthermore, it limits access to authorized personnel only. The ability to track access to and from data rooms is vital in the fight against cybercrime.
  3. Access control with video surveillance –  Using video surveillance in conjunction with access control provides the best infrastructure protection and cybercrime deterrence. The integration of video and access control provides the most secure access. Since, dual authentication requires a user to swipe their badge and look into a camera to verify the card credential matches the user, identification theft and piggybacking into secure areas is preventable.

These are just a few steps that you can take to safeguard your network equipment against cybercrime and are easy to implement with the right technology solutions partner. Because, with the rise in cybercrime, why wouldn’t you add an extra layer of protection?