DOCUMENT & DATA MANAGEMENT Your people might be your
biggest threat Tailgating is the act of following someone through an open door unauthorised and is a widely accepted security threat. The follower is the one at fault, even if there is no intent to cause harm and the person being followed may not even be aware of the act. In contrast, collusion is when individuals purposefully act to let someone in through a secured point who otherwise wouldn’t gain access. With collusion, the one with the key card is at fault as the intention is to bypass the security system to allow unauthorised access. You need to be able to detect any occurrence of these kinds of unauthorised access events and deal with them appropriately.
“If an attacker wants to break
into a system, the most effective approach is to try to exploit
the weakest link - not operating systems, firewalls or encryption algorithms - but people.” - Kevin Mitnick
The threat that arises through collusion by staff should not be underestimated, whether this be intentional or just an employee ‘being kind’ by letting someone they believe is harmless through a controlled access point because they ‘forgot their key card’.
Known for coining the term ‘social engineering’ – which means using “influence and persuasion to deceive people by convincing them that the social engineer is someone he isn’t”– and formerly on the FBI’s Most Wanted list for hacking, Kevin Mitnick believes that people are the
greatest risk to security. He once said: “If an attacker wants to break into a system, the most effective approach is to try to exploit the weakest link—not operating systems, firewalls or encryption algorithms—but people.”
A person with malicious intent and ‘social engineering’ skills can cause great damage by gaining unauthorised physical access to a data centre, even if they have limited technical ability, making it a very tempting attack strategy.
Add an extra layer of detection in
higher security areas Having turnstiles at the front door will prevent unknown individuals from getting beyond reception, but this won’t prevent authorised individuals within your organisation, or approved external contractors such as service engineers or cleaners, from being able to access more sensitive areas of the facility.
Alongside Fastlane Glassgate 150s, a client of ours - a leading social media provider - has been installing our Door Detective Compacts at their sites across EMEA to protect the data they house. Like this data giant, you will likely need to apply additional levels of security on certain interior doors within your building, to perhaps the server room where you need to restrict access to just a few personnel.
The Fastlane Door Detective range reinforces access control systems and provides an extra layer of security and detection by monitoring the throughput of internal access- controlled doorways, corridors and passageways and ensuring that the ‘one person one door access’ rule is met.
Using multiple infrared beams from enclosures mounted near the door frames, Door Detective accurately monitors movement in both directions each time a person presents their credentials to pass through the doorway. This additional level of security and detection helps to prevent unauthorised entrants and tailgating, providing data centre management and their customers with the reassurance that only authorised visits are being made to designated areas of a facility, and their data will not be compromised.
www.idl.co.uk/ www.fastlane-turnstiles.com/
www.tomorrowsfm.com
TOMORROW’S FM | 47
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68