{"id":31317,"date":"2021-08-27T13:56:02","date_gmt":"2021-08-27T13:56:02","guid":{"rendered":"https:\/\/www.get-licensed.co.uk\/get-daily\/?p=31317"},"modified":"2025-05-16T13:00:18","modified_gmt":"2025-05-16T13:00:18","slug":"the-best-cybersecurity-is-physical-security","status":"publish","type":"post","link":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/","title":{"rendered":"The Best Cybersecurity is Physical Security"},"content":{"rendered":"\n<p>Cybersecurity is big business, especially because it <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/60942\/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf\">costs businesses big<\/a> when things go wrong. Cybercriminals have more and more sophisticated ways to attack and steal from companies of all kinds. And the most overlooked cyberattack method of all? Physical hacking.<\/p>\n\n\n\n<p>Hollywood loves to <a href=\"https:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/Main\/HollywoodHacking\">show hacking off<\/a> as some glamorous crime. In reality, computer hacking is far less lively. It&#8217;s actually what makes cybercrime so dangerous.<\/p>\n\n\n\n<p>Yet as businesses invest in cybersecurity, the risks of physical hacking should never be overlooked.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-understanding-what-physical-hacking-is\">Understanding what physical hacking is<\/h3>\n\n\n\n<p>The cybersecurity protection that most businesses choose is all about protecting their digital property. Think encryption, VPNs for secure connections, firewalls, antivirus software, and other <a href=\"https:\/\/www.wired.co.uk\/article\/how-to-avoid-hacking\">ways to prevent hacking<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/_nVq7f26-Uo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>This is a fantastic strategy. But what happens if someone walks into your company office and steals an employee&#8217;s laptop? What if crucial digital files are on an external hard drive, and a criminal just steals that hard drive and plugs it in at home?<\/p>\n\n\n\n<p>This is physical hacking, and it all relies on such simple &#8216;real-world&#8217; actions that it often gets overlooked. While everyone is busy updating software and firmware, actions in the real world go unseen. A cut cable here, a USB drive secretly plugged in there, and hackers can steal valuable data without ever typing a line of code.<\/p>\n\n\n\n<p>Perhaps you can already see why <a href=\"https:\/\/www.get-licensed.co.uk\/get-licensed-for-business\">having security professionals onsite<\/a> can prevent a lot of these crimes.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-examples-of-physical-hacking\">Examples of physical hacking<\/h3>\n\n\n\n<p>In cybersecurity, physical hacking is any action a criminal takes in person to get unauthorised access to sensitive or financial data. In other words, it&#8217;s not about hacking your password from somewhere far away. It&#8217;s about physically using or tampering with your tech, and hacking into it that way.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Watch this hacker break into a company\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/PWVN3Rq4gzw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Physical hacking is put into action by criminals in various ways.<\/p>\n\n\n\n<p><strong>Criminals gain access to restricted areas due to other employees&#8217; politeness.<\/strong> Walking fast behind someone who works in an office, a criminal can rely on the worker in front of them to hold open a door that&#8217;d usually need a keycard to enter. Once inside, that criminal can help themselves to laptops, hard drives or tampering with company systems.<\/p>\n\n\n\n<p><strong>Criminals who physically access server rooms can tamper with a company&#8217;s connectivity, or even stop it.<\/strong> That criminal could also introduce a device to your servers that intercepts sensitive data and draws it away for their use.<\/p>\n\n\n\n<p><strong>Some cybercriminals leave a USB drive outside the building and rely on an employee&#8217;s curiosity to carry the device inside. <\/strong>When that worker decides to try the drive in their company computer to see what it contains, ransomware is released into the business network. Alternatively, the device silently scrapes the employee&#8217;s machine for passwords, sensitive data and other valuable information to steal.<\/p>\n\n\n\n<p><strong>A criminal or <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/ransomware-attacker-offers-employees-a-cut-if-they-install-demonware-on-their-organization-s-systems\">malicious employee<\/a> can simply watch over the shoulder of another worker entering their password,<\/strong> and use that to later access confidential or financial data.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/aP8yrkkLWlM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Remember, many of these crimes aren&#8217;t as elaborate as the movies make them appear. Keeping this physical side of cybercrime in mind is a vital part of any confident company&#8217;s cybersecurity strategy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-stop-physical-hacking-with-the-right-security-workforce\">Stop physical hacking with the right security workforce<\/h3>\n\n\n\n<p>Businesses should definitely continue to invest in the best corporate cybersecurity tools they can find. However, this investment should never come at the expense of a well-trained team of security professionals.<\/p>\n\n\n\n<p>The truth is that <a href=\"https:\/\/www.ifsecglobal.com\/cyber-security\/managing-cyber-physical-security-threats-through-convergence-hyper-connected-world\/\">physical hacking is growing<\/a>. The worse it gets, the more businesses will lose time, resources and money to cybercrime. Because so much hacking <a href=\"https:\/\/www.darkreading.com\/operations\/85-of-data-breaches-involve-human-interaction-verizon-dbir\">relies on the human element<\/a>, such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\">social engineering<\/a>, a team who keeps a company&#8217;s people safe is hugely important.<\/p>\n\n\n\n<p>Holders of an SIA Licence, like a <a href=\"https:\/\/www.get-licensed.co.uk\/licence\/door-supervisor-licence\">Door Supervisor Licence<\/a> or <a href=\"https:\/\/www.get-licensed.co.uk\/licence\/security-guard-licence\">Security Guard Licence<\/a>, can work to help promote safety and surveillance in businesses. This adds an extra layer to your existing cybersecurity strategy, and you can enhance that even more with a <a href=\"https:\/\/www.get-licensed.co.uk\/cctv\">CCTV operator team<\/a>.<\/p>\n\n\n\n<p>Get Licensed helps people find training and get into work. But we also actively work with companies to provide <a href=\"https:\/\/www.get-licensed.co.uk\/get-licensed-for-business\">security staffing solutions<\/a>, tailored to the needs of your business. Get in contact, and see how we can help you secure your people, your premises, and your private enterprise data.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 20130333,\n\t\t\t\t\t\t\t\t\tformId: \"063220b1-4b2b-4c7f-8fec-cbfa33703493\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1777918272000-1280863783\",\n\t\t\t\t\t\t\t\t\tregion: \"na1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1777918272000-1280863783\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is big business, especially because it costs businesses big when things go wrong. Cybercriminals have more and more sophisticated ways to attack and steal from companies of all kinds. And the most overlooked cyberattack method of all? Physical hacking. Hollywood loves to show hacking off as some glamorous crime. In reality, computer hacking is [&hellip;]<\/p>\n","protected":false},"author":129,"featured_media":34780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[547],"tags":[],"class_list":["post-31317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Best Cybersecurity is Physical Security - Get Licensed Blog<\/title>\n<meta name=\"description\" content=\"Physical hacking is often overlooked in business cybersecurity strategies. That can have devastating results. Learn to stop physical hacking proactively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Best Cybersecurity is Physical Security\" \/>\n<meta property=\"og:description\" content=\"Physical hacking is often overlooked in business cybersecurity strategies. That can have devastating results. Learn to stop physical hacking proactively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Get Licensed Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/getlicensed\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T13:56:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T13:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carl Randle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Get_Licensed\" \/>\n<meta name=\"twitter:site\" content=\"@Get_Licensed\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carl Randle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Best Cybersecurity is Physical Security - Get Licensed Blog","description":"Physical hacking is often overlooked in business cybersecurity strategies. That can have devastating results. Learn to stop physical hacking proactively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/","og_locale":"en_GB","og_type":"article","og_title":"The Best Cybersecurity is Physical Security","og_description":"Physical hacking is often overlooked in business cybersecurity strategies. That can have devastating results. Learn to stop physical hacking proactively.","og_url":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/","og_site_name":"Get Licensed Blog","article_publisher":"https:\/\/www.facebook.com\/getlicensed","article_published_time":"2021-08-27T13:56:02+00:00","article_modified_time":"2025-05-16T13:00:18+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png","type":"image\/png"}],"author":"Carl Randle","twitter_card":"summary_large_image","twitter_creator":"@Get_Licensed","twitter_site":"@Get_Licensed","twitter_misc":{"Written by":"Carl Randle","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#article","isPartOf":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/"},"author":{"name":"Carl Randle","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#\/schema\/person\/21c4d83cb599a75746717fb9172a6205"},"headline":"The Best Cybersecurity is Physical Security","datePublished":"2021-08-27T13:56:02+00:00","dateModified":"2025-05-16T13:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/"},"wordCount":750,"commentCount":0,"publisher":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#organization"},"image":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png","articleSection":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/","name":"The Best Cybersecurity is Physical Security - Get Licensed Blog","isPartOf":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#primaryimage"},"image":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png","datePublished":"2021-08-27T13:56:02+00:00","dateModified":"2025-05-16T13:00:18+00:00","description":"Physical hacking is often overlooked in business cybersecurity strategies. That can have devastating results. Learn to stop physical hacking proactively.","breadcrumb":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#primaryimage","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png","contentUrl":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2021\/08\/physical-security.png","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/the-best-cybersecurity-is-physical-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.get-licensed.co.uk\/get-daily\/"},{"@type":"ListItem","position":2,"name":"The Best Cybersecurity is Physical Security"}]},{"@type":"WebSite","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#website","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/","name":"Get Licensed Blog","description":"Get Licensed Blog - Get tips for security training, sia licence and finding work.","publisher":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.get-licensed.co.uk\/get-daily\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#organization","name":"Get Licensed","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#\/schema\/logo\/image\/","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2020\/02\/Screenshot-2022-02-14-at-15.50.29.png","contentUrl":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-content\/uploads\/2020\/02\/Screenshot-2022-02-14-at-15.50.29.png","width":728,"height":272,"caption":"Get Licensed"},"image":{"@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/getlicensed","https:\/\/x.com\/Get_Licensed","https:\/\/www.youtube.com\/user\/getlicensed","https:\/\/www.instagram.com\/getlicensed\/"]},{"@type":"Person","@id":"https:\/\/www.get-licensed.co.uk\/get-daily\/#\/schema\/person\/21c4d83cb599a75746717fb9172a6205","name":"Carl Randle","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/68d66c31fcb106fb204993a4d8934f596f405ab9e67ed2201a18cb4174e18739?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/68d66c31fcb106fb204993a4d8934f596f405ab9e67ed2201a18cb4174e18739?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68d66c31fcb106fb204993a4d8934f596f405ab9e67ed2201a18cb4174e18739?s=96&d=mm&r=g","caption":"Carl Randle"},"description":"Carl creates video and written content on security training, licensing, and industry best practices. He specialises in simplifying complex SIA requirements for learners and employers alike. Carl\u2019s content ensures security professionals can confidently meet standards and excel in their roles.","sameAs":["https:\/\/www.instagram.com\/carlrandle\/","https:\/\/uk.linkedin.com\/in\/carlrandle"],"jobTitle":"Head of Content at Get Licensed | Security Industry Writer","worksFor":"Get Licensed","url":"https:\/\/www.get-licensed.co.uk\/get-daily\/author\/carlrandle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/posts\/31317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/users\/129"}],"replies":[{"embeddable":true,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/comments?post=31317"}],"version-history":[{"count":23,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/posts\/31317\/revisions"}],"predecessor-version":[{"id":33887,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/posts\/31317\/revisions\/33887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/media\/34780"}],"wp:attachment":[{"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/media?parent=31317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/categories?post=31317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.get-licensed.co.uk\/get-daily\/wp-json\/wp\/v2\/tags?post=31317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}