Importance of Physical Security in the Workplace

Slide Note
Embed
Share

Learn why physical security is crucial for safeguarding people and property, preventing unauthorized access, and enhancing overall safety in the workplace. Explore key components, basic measures, and ways to secure assets through passwords, locks, barriers, and surveillance. Understand the significance of physical security in mitigating risks, reducing vulnerabilities, and deterring criminals from exploiting weaknesses. Be aware of the potential consequences of security breaches and the importance of proactive protection against unauthorized access to critical assets.


Uploaded on Nov 16, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Physical Security Keeping Your Information Safe This training will teach you why physical security is important and how you can improve physical security in your workplace

  2. Introduction What You Will Learn

  3. Why Physical Security Is Important Physical security helps protect people and property Prevents unauthorized access Provides a simple and effective first line of defense Keeps employees and assets safer and more secure

  4. Three Key Components of Physical Security

  5. The Basics Physical Security Basics

  6. What Physical Security Measures Can do Protect assets, information, programs, and personnel Prevent breaches and damage to information, businesses, healthcare and other institutions Guard against dangers from loss, theft, accidents, and malicious attacks

  7. Ways to Physically Secure People and Property Passwords Locks Physical Barriers Surveillance

  8. Why You Should Care About Physical Security It is an incredibly effective first line of defense It can cut down on careless behaviors and reduce vulnerabilities Criminals are opportunistic they look for weaknesses and try to take advantage of mistakes

  9. Physical Security Breaches Give Criminals Unauthorized Access to Assets Physical security breaches can give criminals unauthorized access to the following assets: Server Rooms Important Files Personnel Files

  10. Like Hacking, Physical Breaches Result in Loss of Sensitive Information Physical breaches can also result in loss of sensitive information. Sensitive information is special personal information in terms of the POPI Act. Look out for: Scammers that might try to break into offices, steal your laptop or phone, or learn your network passwords to get to private information People who find lost phones, laptops, and files might sell them or use confidential information for personal gain

  11. Levels of Physical Security Low-Level Security Different levels of physical security Can be applied to different assets. Medium-Level Security High-Level Security

  12. Low-Level Security Appropriate for assets and areas that contain public or non- confidential information. There is little or no risk if lost or accessed by criminals. Low-Level Security Devices and documents that contain non- confidential information (e.g., patient education information) require low-level security You can leave low-level security items in an unlocked drawer or on your desk Medium-Level Security High-Level Security

  13. Medium-Level Security Needed for assets and areas that contain confidential information. There is a moderate to high risk if lost or accessed by criminals. Low-Level Security Use physical security measures to protect medium-level security assets. Locks, passwords, or physical barriers are needed. Employ stronger security measures for items and areas that store more sensitive data, example special personal information in terms of the POPI Act (medical records). Medium-Level Security High-Level Security

  14. High-Level Security Critical for assets and areas that contain highly confidential and business-critical information. There is a high or extreme risk if lost or accessed by criminals. Low-Level Security Serious care must be taken to protect these types of assets. Combine multiple physical security measures: Medium-Level Security Secure the entry to a bank of servers and require passwords to log in Password-protect your electronic devices and either keep them with you or lock them in a safe place High-Level Security

  15. Challenge Secure Assets Based on Risk Level Let's see what you've learned! View each item description and determine the level of physical security required: low, medium, or high. You ll need at least 3 correct answers to move on. Items and areas that hold sensitive information require more security. SCORE BY DENOTING LOW-MEDIUM OR HIGH RISK

  16. Secure Assets Based on Risk Level A file containing information about your organisation s service providers?

  17. Challenge - CORRECT Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose "Medium." Good job! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.

  18. Challenge - INCORRECT Oops Secure Assets Based on Risk Level A file containing information about your organisation s service materials? You chose Low" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building. Let's discuss examples of types of security Remember, the risk level may for different organisations

  19. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level A file containing information about your organisation s service providers? You chose High" Oops! Medium-level security is needed. It may seem strange, but any kind of internal information can be used by scammers. Some have been known to impersonate service providers to gain entry to a building.

  20. Secure Assets Based on Risk Level What risk level is a CD with patient education materials?

  21. Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Low." Good job! No special security is needed. Patient education materials are freely shared with the public.

  22. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose Medium" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.

  23. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a CD with patient education materials? You chose High" Oops! Low-level security is needed. No special security is needed. Patient education materials are freely shared with the public.

  24. Secure Assets Based on Risk Level What risk level is a secure server?

  25. Challenge - CORRECT Secure Assets Based on Risk Level What risk level is a secure server? You chose High" Good job! Server's house a lot of confidential information. Protect these assets with multiple security measures.

  26. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Low" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple security measures.

  27. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is a secure server? You chose Medium" Oops! High-level security is needed. Server's house a lot of confidential information. Protect these assets with multiple high level security measures.

  28. Secure Assets Based on Risk Level What risk level is a USB stick containing patient/staff/confidential information?

  29. Challenge - CORRECT What risk level is a secure level for a USB stick containing patient/confidential/staff information? You chose High" Good job! This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  30. Challenge - INCORRECT Oops! Secure Assets Based on Risk Level What risk level is secure for a USB stick containing patient information? You chose Low" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  31. Challenge - INCORRECT Oops What risk level is a USB stick containing patient information? You choose Medium" Oops! High-level security is needed. This requires high-level security. If lost or accessed by unauthorized sources, there could be a major impact on the practice.

  32. Thank you. I hope you feel more at ease with Risk and POPIA

Related


More Related Content