Importance of Physical Security in the Workplace
Learn why physical security is crucial for safeguarding people and property, preventing unauthorized access, and enhancing overall safety in the workplace. Explore key components, basic measures, and ways to secure assets through passwords, locks, barriers, and surveillance. Understand the significance of physical security in mitigating risks, reducing vulnerabilities, and deterring criminals from exploiting weaknesses. Be aware of the potential consequences of security breaches and the importance of proactive protection against unauthorized access to critical assets.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Physical Security Keeping Your Information Safe This training will teach you why physical security is important and how you can improve physical security in your workplace
Introduction What You Will Learn
Why Physical Security Is Important Physical security helps protect people and property Prevents unauthorized access Provides a simple and effective first line of defense Keeps employees and assets safer and more secure
The Basics Physical Security Basics
What Physical Security Measures Can do Protect assets, information, programs, and personnel Prevent breaches and damage to information, businesses, healthcare and other institutions Guard against dangers from loss, theft, accidents, and malicious attacks
Ways to Physically Secure People and Property Passwords Locks Physical Barriers Surveillance
Why You Should Care About Physical Security It is an incredibly effective first line of defense It can cut down on careless behaviors and reduce vulnerabilities Criminals are opportunistic they look for weaknesses and try to take advantage of mistakes
Physical Security Breaches Give Criminals Unauthorized Access to Assets Physical security breaches can give criminals unauthorized access to the following assets: Server Rooms Important Files Personnel Files
Like Hacking, Physical Breaches Result in Loss of Sensitive Information Physical breaches can also result in loss of sensitive information. Sensitive information is special personal information in terms of the POPI Act. Look out for: Scammers that might try to break into offices, steal your laptop or phone, or learn your network passwords to get to private information People who find lost phones, laptops, and files might sell them or use confidential information for personal gain
Levels of Physical Security Low-Level Security Different levels of physical security Can be applied to different assets. Medium-Level Security High-Level Security
Low-Level Security Appropriate for assets and areas that contain public or non- confidential information. There is little or no risk if lost or accessed by criminals. Low-Level Security Devices and documents that contain non- confidential information (e.g., patient education information) require low-level security You can leave low-level security items in an unlocked drawer or on your desk Medium-Level Security High-Level Security
Medium-Level Security Needed for assets and areas that contain confidential information. There is a moderate to high risk if lost or accessed by criminals. Low-Level Security Use physical security measures to protect medium-level security assets. Locks, passwords, or physical barriers are needed. Employ stronger security measures for items and areas that store more sensitive data, example special personal information in terms of the POPI Act (medical records). Medium-Level Security High-Level Security
High-Level Security Critical for assets and areas that contain highly confidential and business-critical information. There is a high or extreme risk if lost or accessed by criminals. Low-Level Security Serious care must be taken to protect these types of assets. Combine multiple physical security measures: Medium-Level Security Secure the entry to a bank of servers and require passwords to log in Password-protect your electronic devices and either keep them with you or lock them in a safe place High-Level Security
Challenge Secure Assets Based on Risk Level Let's see what you've learned! View each item description and determine the level of physical security required: low, medium, or high. You ll need at least 3 correct answers to move on. Items and areas that hold sensitive information require more security. SCORE BY DENOTING LOW-MEDIUM OR HIGH RISK
Secure Assets Based on Risk Level A file containing information about your organisation s service providers?
Challenge - CORRECT Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose "Medium." Good job! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.
Challenge - INCORRECT Oops Secure Assets Based on Risk Level A file containing information about your organisation s service materials? You chose Low" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building. Let's discuss examples of types of security Remember, the risk level may for different organisations
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose High" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.
Secure Assets Based on Risk Level What risk level is a CD with patient education materials?
Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Low." Good job! No special security is needed. Patient education materials are freely shared with the public.
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Medium" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose High" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.
Secure Assets Based on Risk Level What risk level is a secure server?
Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a secure server? You chose High" Good job! Server's house a lot of confidential information. Protect these assets with multiple security measures.
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Low" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple security measures.
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Medium" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple high level security measures.
Secure Assets Based on Risk Level What risk level is a USB stick containing patient/staff/confidential information?
Challenge - CORRECT What risk level is a secure level for a USB stick containing patient/confidential/staff information? You chose High" Good job! This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.
Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is secure for a USB stick containing patient information? You chose Low" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.
Challenge - INCORRECT Oops What risk level is a USB stick containing patient information? You choose Medium" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.