Assessing Physical Security in the Workplace

Assessment 1: Importance of Physical Security in the Workplace:

Physical protection is critical but most companies typically ignore it. If you don't want someone to steal the details or kill it, it's essential in case of a natural catastrophe. The motive could be something, the attacker doing that for personal benefit, monetary reward, looking for revenge, or one is being threatened as the only viable target. Although physical security is asserting to be complicated than centuries later since more sensitive technologies (like USB drives, laptops, smartphones, tablets, etc.) seem to be obtainable that allow information to be steeled easily and smoothly. A full, skilled safety needs assessment towards an active protection plan (General Security, 2018). The office of the Federal Protective Service plays a vital role in managing the risk evaluation being performed in the office or building itself. Hacking into communications infrastructure might not be the only way to steal or use confidential information against such an enterprise. To keep criminals from obtaining physical control and taking the important data, that they want, physical protection needs to be executed correctly (USDA, 2019). Unless something were to happen, all of the firewalls, cryptography as well as other security procedures would've been worthless. Organizations have the daunting task of trying to protect data, equipment, personnel, services, systems, and properties from corporations. The business may face civil or legal challenges criminal measures for malpractice on failure to use proper security screening. Physical safety is aimed at safeguarding staff, records, equipment, IT systems, services, and all other properties of the organization. The strategies used to safeguard the resources of the business need either a layered attitude. If several layers ought to be circumvented to reach a resource, it's tougher for an intruder to hit their target. (Hutter, 2016) The details reported in this section will emphasize the role of physical protection, together with the methods that should have been placed in responsibility to determine security measures at facilities through administrative, technical as well as physical means.

An array of strategies could be implemented so as to enhance security in the workplace:

Payment Card Industry is a regulatory standard that is developed to ensure that the environment is safeguarded for all businesses and institutions dealing with any user credentials. Information Organization for Standardization is a framework for exercising the security of the information. It is composed of many parts addressing a broad variety of security concerns (General Security, 2018). Holding executive details file remarks a security department must retain an emergency contact folder for direct access for top employees containing classified information that could be used in a crisis. Consideration of creating safe building areas may require maintenance with one or more safe spaces in the working place. Public individual access to the customer service area should be primed. The server room shall always be kept locked or secured with stringent passwords and the access shall be limited to authoritative members only (USDA, 2019). A hacker can connect a laptop into a server, and use sniffer technology to collect network-wide information. Please ensure as most of the networking platforms as possible are all in the sealed closet, or even in a storage cabinet elsewhere around the building if they've been in another place. Most IT managers build backups in the server room next to the storage. Unplugging the cables obviously cannot stop technically professional workers. Disc locks, like the one at, can be incorporated into the floppy drives on certain computer systems which still have certain diskettes to lockout (Shinder, 2007). Several of today's printers preserve the material of documentation in their onboard archives, thus a policy of shredding all unnecessary printed documents shall be implemented, including those who do not comprise sensitive data. Managing other businesses makes a major mistake by thinking that everyone who works in the workplace is well concerned about safety protocols and emergency measures to be taken. People thus overlook the training sessions and the sharing of knowledge for stronger workplace safety. Personal should often monitor regularly the current workplace safety programs, processes, strategies, and potential consequences (Kisi, 2019). In an attempt to address the growing range of workplace casualties serious incidents of workplace crime in general, and also to protect consumers from violence in the workplace, the U.S. Occupational Safety & Health Administration (OSHA) importantly launched a program toward workplace bullying and recognized various individuals and sectors with such a high potential for harm at the job. These corporations have included where staff share income with the public or work overnight, or those delivering services to people in the health and social care services. In compliance with the new regulation, OSHA aims to carry out audits of these organizations to assess if employees are taking appropriate protective steps to minimize the risk of violence in the workplace (Nater, 2012).


General Security. (2018). The Importance of Physical Security in the Workplace. Infosec Resources. Retrieved from .

Hutter, D. (2016). Physical Security and Why It Is Important. SANS Institute InfoSec Reading Room.

Kisi. (2019). Top 5 Physical Security Tips for the Workplace | Kisi. Retrieved from .

Nater, F. (2012). 10 Tips to Mitigate Workplace Violence and Threats. Retrieved from .

Shinder, D. (2007). 10 physical security measures every organization should take. TechRepublic. Retrieved from .

USDA. (2019). Security in the Workplace - Information Material. Retrieved from

Information System Management Assessment List

Assessing Physical Security in the Workplace

Privacy Law Violations and Outcome

Encryption and National Security

Effects of Malware and Spam on Business

Security Policies

Security Controls and Their Shortcomings

Backup Systems and Plans

Incident Response Plan

The Internet and the World Wide Web