Written by Stu Kushner

How to Ensure Data Security at the Physical Layer – Part 1

Cybercriminals are not finicky. They will find a way to exploit any vulnerability, and the aftermath can be disastrous for any organization. A 2018 study put the average cost of an enterprise network data breach at almost $4 million. Financial losses may only be the beginning because it may require several years until a company is able to regain its standing in the eyes of consumers and other businesses after a serious data breach.

Nowadays, modern buildings and facilities are becoming increasingly connected to enable IoT, PoE, and wireless connectivity solutions. Each connection is a potential opening to a company’s network. In order to prevent unauthorized access, an organization must secure each layer and secure every point of entry. Measures include application level encryption, firewalls, two-factor authentication, virtual private networks (VPNs), and physical layer security.

Network Infrastructure Targeted

Although it should be an integral aspect of an organization’s security strategy, physical layer infrastructure is often overlooked. This is because security implementation has been traditionally performed at a network’s higher, logical layers. However, as commercial building networks become increasingly integrated with all aspects of an enterprise, the physical layer is becoming a bigger target for cybercrime.

The party in command of a network’s routing infrastructure also controls the data that flows through it. As a result, concerns regarding network infrastructure security typically focus on the two types of unauthorized access below:

Unauthorized Access by an Unauthorized Individual

The above is addressed by installing IP-connected cameras, access controls, occupancy sensors, and other security. Physical cabling security is implemented through secure patch cords, keyed connectors, and port blockers. AIM (automated infrastructure management) solutions can also be deployed to detect and report unauthorized activities.

Unauthorized Access by an Authorized Individual

Detection and prevention are both difficult because many security measures will be ineffective. However, AIM can be deployed for automatically detecting and reporting the installation of an unauthorized network device. Its location can be determined, and changes to the physical layer will be recorded as they occur.

Part 2 will discuss Recommendations for Implementation.

Progressive Office Cabling

Founded in 1986, Progressive Office’s success has been a direct result of years of commitment to seeking cost-effective solutions. Working together, Progressive teams are committed to getting your data cables installed and operating while minimizing disruption and downtime. Call our toll free number (800) 614-4560 today.

About Stu Kushner

Stu Kushner earned an Engineering Degree from the University of Maryland, College Park. From there he worked at Boeing Commercial Aircraft, Hexcel Corporation and Case-Rixon as a computer design engineer and systems manager. He now works as the marketing director and project manager here at Progressive Office since its founding in 1986.

Translate »