Importance of Physical Security in the Workplace

undefined
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
Keeping Your Information Safe
 
T
h
i
s
 
t
r
a
i
n
i
n
g
 
w
i
l
l
 
t
e
a
c
h
 
y
o
u
 
w
h
y
 
p
h
y
s
i
c
a
l
 
s
e
c
u
r
i
t
y
 
i
s
 
i
m
p
o
r
t
a
n
t
 
a
n
d
h
o
w
 
y
o
u
 
c
a
n
 
i
m
p
r
o
v
e
 
p
h
y
s
i
c
a
l
 
s
e
c
u
r
i
t
y
 
i
n
 
y
o
u
r
 
w
o
r
k
p
l
a
c
e
 
Introduction
 
What You Will Learn
 
W
h
y
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
I
s
 
I
m
p
o
r
t
a
n
t
 
  Physical security helps protect people and property
Prevents unauthorized access
Provides a simple and effective first line of defense
Keeps employees and assets safer and more secure
 
 
T
h
r
e
e
 
K
e
y
 
C
o
m
p
o
n
e
n
t
s
 
o
f
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
The Basics
 
Physical Security Basics
 
W
h
a
t
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
M
e
a
s
u
r
e
s
 
C
a
n
 
d
o
 
 
Protect assets, information, programs, and personnel
Prevent breaches and damage to information, businesses, healthcare
and other institutions
Guard against dangers from loss, theft, accidents, and malicious
attacks
 
W
a
y
s
 
t
o
 
P
h
y
s
i
c
a
l
l
y
 
S
e
c
u
r
e
 
P
e
o
p
l
e
 
a
n
d
 
P
r
o
p
e
r
t
y
 
Locks
 
Passwords
 
Physical Barriers
 
Surveillance
W
h
y
 
Y
o
u
 
S
h
o
u
l
d
 
C
a
r
e
 
A
b
o
u
t
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
It is an incredibly effective first line
of defense
It can cut down on careless behaviors
and reduce vulnerabilities
Criminals are opportunistic — they
look for weaknesses and try to take
advantage of mistakes
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
B
r
e
a
c
h
e
s
 
G
i
v
e
 
C
r
i
m
i
n
a
l
s
 
U
n
a
u
t
h
o
r
i
z
e
d
A
c
c
e
s
s
 
t
o
 
A
s
s
e
t
s
 
Personnel Files
 
Important Files
 
Server Rooms
Physical security breaches can give criminals
unauthorized access to the following assets:
L
i
k
e
 
H
a
c
k
i
n
g
,
 
P
h
y
s
i
c
a
l
 
B
r
e
a
c
h
e
s
 
R
e
s
u
l
t
 
i
n
 
L
o
s
s
 
o
f
 
S
e
n
s
i
t
i
v
e
I
n
f
o
r
m
a
t
i
o
n
 
Scammers that might try to break into offices, steal
your laptop or phone, or learn your network
passwords to get to private information
People who find lost phones, laptops, and files might
sell them or use confidential information for personal
gain
Physical breaches can also result in loss of sensitive 
information. Sensitive
information is special personal information in terms of the POPI Act. Look
out for:
 
Low-Level Security
 
Medium-Level Security
 
High-Level Security
L
e
v
e
l
s
 
o
f
 
P
h
y
s
i
c
a
l
 
S
e
c
u
r
i
t
y
 
Different levels of physical security
Can be applied to different assets.
 
Low-Level Security
 
Appropriate for assets and areas that contain public or non-
confidential information. There is little or no risk if lost or
accessed by criminals.
 
Devices and documents that contain non-
confidential information (e.g., patient
education information) require low-level
security
You can leave low-level security items in an
unlocked drawer or on your desk
 
Low-Level Security
 
Medium-Level Security
 
High-Level Security
 
Low-Level Security
 
Medium-Level Security
 
High-Level Security
 
Medium-Level Security
 
Needed for assets and areas that contain confidential
information. There is a moderate to high risk if lost or
accessed by criminals.
 
Use physical security measures to protect
medium-level security assets. Locks,
passwords, or physical barriers are needed.
Employ stronger security measures for items
and areas that store more sensitive data,
example special personal information in terms
of the POPI Act (medical records).
 
Low-Level Security
 
Medium-Level Security
 
High-Level Security
 
High-Level Security
 
Critical for assets and areas that contain highly confidential
and business-critical information. There is a high or extreme
risk if lost or accessed by criminals.
 
Serious care must be taken to protect these types
of assets. Combine multiple physical security
measures:
 
Secure the entry to a bank of servers and
require passwords to log in
Password-protect your electronic devices and
either keep them with you or lock them in a
safe place
 
C
h
a
l
l
e
n
g
e
S
e
c
u
r
e
 
A
s
s
e
t
s
 
B
a
s
e
d
 
o
n
 
R
i
s
k
 
L
e
v
e
l
 
Let's see what you've learned!
 
View each item description and determine the level of physical security
required: low, medium, or high. You’ll need at least 
3 correct answers 
to
move on.
 Items and areas that hold 
sensitive
 information require more security.
SCORE BY DENOTING LOW-MEDIUM OR HIGH RISK
 
S
e
c
u
r
e
 
A
s
s
e
t
s
 
B
a
s
e
d
 
o
n
 
R
i
s
k
 
L
e
v
e
l
 
A file containing information about your organisation’s service providers?
 
C
h
a
l
l
e
n
g
e
 
-
 
C
O
R
R
E
C
T
 
Secure Assets Based on Risk Level 
A file containing
information about your organisation’s service providers?
 
You chose "Medium."
 
Good job!
 Medium-level security is
needed.
It may seem strange, but any kind of internal information
can be used by scammers. Some have been known to
impersonate service providers to gain entry to a building
.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops
 
Secure Assets Based on Risk Level 
A file containing
information about your organisation’s service materials?
 
You chose “Low"
 
Oops!
 Medium-level security is needed.
It may seem strange, but any kind of internal information
can be used by scammers. Some have been known to
impersonate service providers to gain entry to a building
.
Let's discuss examples of types of security
Remember, the risk level may 
for different organisations
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
A file containing
information about your organisation’s service providers?
 
You chose “High"
 
Oops!
 Medium-level security is needed.
It may seem strange, but any kind of internal information
can be used by scammers. Some have been known to
impersonate service providers to gain entry to a building
.
 
S
e
c
u
r
e
 
A
s
s
e
t
s
 
B
a
s
e
d
 
o
n
 
R
i
s
k
 
L
e
v
e
l
 
What risk level is a CD with patient education materials?
 
C
h
a
l
l
e
n
g
e
 
-
 
C
O
R
R
E
C
T
 
Secure Assets Based on Risk Level 
What risk level is a CD
with patient education materials?
 
You chose “Low."
 
Good job!
 
No special security is needed. Patient education materials
are freely shared with the public.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
What risk level is a CD
with patient education materials?
 
You chose “Medium"
 
Oops!
 Low-level security is needed.
No special security is needed. Patient education materials
are freely shared with the public.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
What risk level is a CD
with patient education materials?
 
You chose “High"
 
Oops!
 Low-level security is needed.
No special security is needed. Patient education materials
are freely shared with the public.
 
S
e
c
u
r
e
 
A
s
s
e
t
s
 
B
a
s
e
d
 
o
n
 
R
i
s
k
 
L
e
v
e
l
 
What risk level is a secure server?
 
C
h
a
l
l
e
n
g
e
 
-
 
C
O
R
R
E
C
T
 
Secure Assets Based on Risk Level 
What risk level is a
secure server?
 
You chose “High"
 
Good job!
 
Server's house a lot of confidential information. Protect
these assets with multiple security measures.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
What risk level is a
secure server?
 
You chose “Low"
 
Oops!
 High-level security is needed.
Server's house a lot of confidential information. Protect
these assets with multiple security measures.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
What risk level is a
secure server?
 
You chose “Medium"
 
Oops!
 High-level security is needed.
Server's house a lot of confidential information. Protect
these assets with multiple high level security measures.
 
S
e
c
u
r
e
 
A
s
s
e
t
s
 
B
a
s
e
d
 
o
n
 
R
i
s
k
 
L
e
v
e
l
 
What risk level is a USB stick containing patient/staff/confidential information?
 
C
h
a
l
l
e
n
g
e
 
-
 
C
O
R
R
E
C
T
 
What risk level is a secure level for a USB stick containing
patient/confidential/staff information?
 
You chose “High" Good job!
 
This requires high-level security. If lost or accessed by
unauthorized sources, there could be a major impact on the
practice.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops!
 
Secure Assets Based on Risk Level 
What risk level is secure
for a USB stick containing patient information?
 
You chose “Low" Oops!
 
High-level security is needed.
 
This requires high-level security. If lost or accessed by
unauthorized sources, there could be a major impact on the
practice.
 
C
h
a
l
l
e
n
g
e
 
-
 
I
N
C
O
R
R
E
C
T
Oops
 
What risk level is a USB stick containing patient
information?
 
You choose “Medium" Oops!
 High-level security is needed.
This requires high-level security. If lost or accessed by
unauthorized sources, there could be a major impact on the
practice.
 
Thank you. I hope you feel more at ease with Risk and POPIA
Slide Note
Embed
Share

Learn why physical security is crucial for safeguarding people and property, preventing unauthorized access, and enhancing overall safety in the workplace. Explore key components, basic measures, and ways to secure assets through passwords, locks, barriers, and surveillance. Understand the significance of physical security in mitigating risks, reducing vulnerabilities, and deterring criminals from exploiting weaknesses. Be aware of the potential consequences of security breaches and the importance of proactive protection against unauthorized access to critical assets.

  • Security
  • Workplace
  • Physical Security
  • Safety
  • Protection

Uploaded on Nov 16, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Physical Security Keeping Your Information Safe This training will teach you why physical security is important and how you can improve physical security in your workplace

  2. Introduction What You Will Learn

  3. Why Physical Security Is Important Physical security helps protect people and property Prevents unauthorized access Provides a simple and effective first line of defense Keeps employees and assets safer and more secure

  4. Three Key Components of Physical Security

  5. The Basics Physical Security Basics

  6. What Physical Security Measures Can do Protect assets, information, programs, and personnel Prevent breaches and damage to information, businesses, healthcare and other institutions Guard against dangers from loss, theft, accidents, and malicious attacks

  7. Ways to Physically Secure People and Property Passwords Locks Physical Barriers Surveillance

  8. Why You Should Care About Physical Security It is an incredibly effective first line of defense It can cut down on careless behaviors and reduce vulnerabilities Criminals are opportunistic they look for weaknesses and try to take advantage of mistakes

  9. Physical Security Breaches Give Criminals Unauthorized Access to Assets Physical security breaches can give criminals unauthorized access to the following assets: Server Rooms Important Files Personnel Files

  10. Like Hacking, Physical Breaches Result in Loss of Sensitive Information Physical breaches can also result in loss of sensitive information. Sensitive information is special personal information in terms of the POPI Act. Look out for: Scammers that might try to break into offices, steal your laptop or phone, or learn your network passwords to get to private information People who find lost phones, laptops, and files might sell them or use confidential information for personal gain

  11. Levels of Physical Security Low-Level Security Different levels of physical security Can be applied to different assets. Medium-Level Security High-Level Security

  12. Low-Level Security Appropriate for assets and areas that contain public or non- confidential information. There is little or no risk if lost or accessed by criminals. Low-Level Security Devices and documents that contain non- confidential information (e.g., patient education information) require low-level security You can leave low-level security items in an unlocked drawer or on your desk Medium-Level Security High-Level Security

  13. Medium-Level Security Needed for assets and areas that contain confidential information. There is a moderate to high risk if lost or accessed by criminals. Low-Level Security Use physical security measures to protect medium-level security assets. Locks, passwords, or physical barriers are needed. Employ stronger security measures for items and areas that store more sensitive data, example special personal information in terms of the POPI Act (medical records). Medium-Level Security High-Level Security

  14. High-Level Security Critical for assets and areas that contain highly confidential and business-critical information. There is a high or extreme risk if lost or accessed by criminals. Low-Level Security Serious care must be taken to protect these types of assets. Combine multiple physical security measures: Medium-Level Security Secure the entry to a bank of servers and require passwords to log in Password-protect your electronic devices and either keep them with you or lock them in a safe place High-Level Security

  15. Challenge Secure Assets Based on Risk Level Let's see what you've learned! View each item description and determine the level of physical security required: low, medium, or high. You ll need at least 3 correct answers to move on. Items and areas that hold sensitive information require more security. SCORE BY DENOTING LOW-MEDIUM OR HIGH RISK

  16. Secure Assets Based on Risk Level A file containing information about your organisation s service providers?

  17. Challenge - CORRECT Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose "Medium." Good job! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.

  18. Challenge - INCORRECT Oops Secure Assets Based on Risk Level A file containing information about your organisation s service materials? You chose Low" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building. Let's discuss examples of types of security Remember, the risk level may for different organisations

  19. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose High" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.

  20. Secure Assets Based on Risk Level What risk level is a CD with patient education materials?

  21. Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Low." Good job! No special security is needed. Patient education materials are freely shared with the public.

  22. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Medium" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.

  23. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose High" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.

  24. Secure Assets Based on Risk Level What risk level is a secure server?

  25. Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a secure server? You chose High" Good job! Server's house a lot of confidential information. Protect these assets with multiple security measures.

  26. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Low" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple security measures.

  27. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Medium" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple high level security measures.

  28. Secure Assets Based on Risk Level What risk level is a USB stick containing patient/staff/confidential information?

  29. Challenge - CORRECT What risk level is a secure level for a USB stick containing patient/confidential/staff information? You chose High" Good job! This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  30. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is secure for a USB stick containing patient information? You chose Low" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  31. Challenge - INCORRECT Oops What risk level is a USB stick containing patient information? You choose Medium" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  32. Thank you. I hope you feel more at ease with Risk and POPIA

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#