The modern cyberattack is a multi-vector effort – including attempts to compromise your offices and physical data centre. If they cannot breach your firewall and perimeter defences, hackers may try to compromise systems on site.
A Physical Security Assessment tests every aspect of your data centre defences. How do you control access to the machine room? Could malware be installed manually on your PCs? Are your employees properly trained to deal with a social engineering attack?
To identify on-site vulnerabilities
If a stranger walked in off the street, how much of your IT infrastructure could they access? An assessment will identify shortcomings and loopholes that expose your business to unacceptable risks.
To identify new training opportunities
A confident hacker could trick unprepared employees into granting access to secure areas of your building or divulging sensitive information. A Physical Security Assessment will uncover these instances and identify where additional staff training is required.
To create a holistic security strategy
To counter multi-vector cyberattacks, you need to include physical security provisions as part of your strategy. An assessment will help you understand where additional work is required to increase overall protections.
To make effective security investments
Physical security provisions are more involved than simply strengthening the door to the server room. A Physical Security Assessment will help identify those areas most in need of investment.
To achieve or maintain compliance
Regulations like GDPR are not solely restricted to IT systems. Your business has a duty to protect all personal data, including details held in paper files. To maintain compliance, you will need to secure physical and digital assets.
Audit physical security defences
Our consultants will conduct a site survey to assess your current defences. They will look at how easy it is to enter your premises, how doors are locked, and whether access controls are being used effectively.
Audit local machine settings
If a hacker gains access to one of your PCs, can they install malware? Could they connect an external storage device to steal data? The assessment will consider how well you protect against physical access by attackers.
Conduct physical penetration tests
Our consultants can make an unexpected visit to your offices, and attempt to gain unauthorised access – just as a hacker would. We will then conduct a penetration test to see how many systems we can compromise before being challenged.
Provide actionable recommendations
We will provide a plain-English report containing our findings, along with an action plan for improving physical security of your systems.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
Exploiting the eRosary Application In this post we’re going to cover a trivial full account takeover vulnerability our team identified within the new eRosary application, whilst placing an order for the watch! The ClickToPray eRosary beads are advertised as ‘an interactive, smart and app-driven device that serves as a tool for learning how to pray […]
In this post, we’re going to detail some of the issues our team identified with the an extremely common Alarm & GPS device used by vulnerable people around the world (at least 10,000+ in the UK). The device in question is manufactured in China and seems to be purchased in bulk by numerous providers who […]