In today's world it is important for any organization to have business continuity and any loss of data to the company can cost the company a loss of customers, having to fight lawsuits and pay fines huge. All of these need to be addressed and eliminated. Sensitive data represents an important part of company assets, and anyone with access to this data can have a huge impact on the company. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Protecting an organization's physical assets requires security measures: Deb said you should lock the server room. Server room doors must be protected by strong locks. Strict policies should be established that the server room must be locked when not in use, and records should be kept of who enters and exits the room and who has the key or code to enter the room. The server room is the main center of the network and any unauthorized access to the servers can cause enormous damage to the company. You need to set up surveillance. Even after the door has been closed anyone can have authorized access to the room. Registry should be one way to monitor and another way is to have smart access like biometric scanning or token system to limit access to authorized users only. A CCTV could be installed in a place where people cannot see to record people coming and going. You can enable alarms to monitor and notify you if intruders gain access. Highly valuable assets should be protected in a room that should be locked. Assets such as a laptop could also pose a threat to the business where a hacker who gains access to the laptop can hack data as it passes through a network. All such devices must be placed in a secured or locked room. You can configure rack-mount servers. These rack-mounted servers take up very little space in your company and can be protected easily. Rack servers can be placed in closed racks and fixed to the floor, which will be difficult to move. Workstations must also be protected. All laptops must be locked to the workstation when away. All computers that are not in use must be removed and secured. Passwords must be set to limit unauthorized access. As Deb stated, portable devices need to protect. All portable devices such as laptops, cell phones and pagers can be stolen easily and can access your organization's data. They should always be with the owner and passwords must be set. All hard drives must be protected. For added protection, data on hard drives should be encrypted, and biometric readers can be configured to protect access to such devices. You need to back up your data. This is an important task in the recovery phase if an incident occurs. When this data is backed up, you should keep in mind that this data or device can also be stolen. You should back up this data in the server room or closer to the server room and install locks on the shelves where the data backup is stored. Backups can usually be kept offsite to prevent data loss during an incident. Most companies provide laptops to employees who don't have a CD or floppy drive. This will prevent employees from copying the information.
tags