This article encourages risk managers and CFOs to go beyond digital network security and be aware that hackers walk through doors as well as firewalls. That industrial controls on vast complexes can be vulnerable to anyone with a smartphone. That when someone can enter your premises and plug an infected thumb drive into the first computer they see, physical security is just as important as IT security. And it considers solutions: measures like vulnerability audits, backup power systems, overrides of electronic controls, and even using redundant IT systems to take over in the event of a cyber-attack.
More on IT Planning
Browse categories
Back to Top
Back to Top