We often have conversations about Cyber Security, even with those that are not focused on the protection of systems and data. So little is known or understood that people are often unaware of the threats around them. Most people just don’t see them. In a discussion regarding the compromise of a student records platform at a school, a general attitude of “So what if some student records are changed?” How bad can that be? If we consider that these individuals will become adults with a credit history, then we can see that this could be the origin of an Identity Theft exploit. The focus of this white paper is to shed some light onto a very dark topic – Cyber Security.
A security guard standing by the door, clear/concise document management policies, adequate lighting in the parking lot, and deadbolts on the doors – long gone are the days when these comprised a complete physical security solution for businesses looking to keep their employees and information safe from attacks. Though the tools for addressing physical security have changed with the rapid advancement of technology and connectivity in the digital age, the core concepts have remained the same. Simply stated, today’s business owners, much like their non-digital predecessors, must protect their assets if they are to mitigate against potentially catastrophic damages/losses that can occur as a result of a security breach.