4 Physical Security Tips That Guarantee Online Protection

Contact us at +65 6336 5920  

Cart (0)

4 Physical Security Tips That Guarantee Online Protection


4 Physical Security Tips That Guarantee Online Protection

Today, many people are undoubtedly aware of the increasingly growing cyber threat landscape as headlines on major cyber incidents affecting global enterprises and small businesses emerge. From conventional yet effective social engineering techniques to new cyber threats like cryptojacking, the list of things to be on guard for is only set to grow bigger. Moreover, adopting remote work only increases the pressure on businesses and employees to maintain online security.

Apart from investing in digital security measures, physical security practices promote online protection and support the former's effectiveness. Below, we share four of these practices that help protect your organisation's information.


1. Be aware of your surroundings

After the advent of the pandemic, remote work was widely adopted and remained the standard to this day. This means work is no longer restricted to the office and is now being done everywhere, from the home and coffee shops to coworking spaces and more. Despite the benefits of this working arrangement, one cannot dismiss the additional security risks posed by these public locations.

For instance, when working in a public space, any sensitive information displayed on the screen can be viewed by people at your side and behind you. As such, it is important to be mindful of your surroundings and take measures to hinder others from snooping on your work. Laptop privacy filters are the best and most readily-available solution for this issue, so be sure to invest in one as soon as possible.


2. Be on the lookout for device theft

Laptop theft remains a common issue today and can affect everyone, from the average worker to independent game developers and even hospital patients. Leaving one's laptop unattended in public spaces like coworking offices or coffee shops could lead to unauthorised access as covered previously or, worse, theft. As such, be wary of keeping devices in sight at all times and educate employees on the best practices to minimise the risk of theft.


3. Use multi-factor authentication where possible

In terms of cost-benefit ratio, multi-factor authentication (MFA) is among the best ways to secure account access permissions and confidential information. Once enabled, users must confirm their identity through various means, typically through biometric identifiers and device or account access. Major tech companies have long supported this layered approach to security, and over the years, other organisations, big and small, have also followed suit.

MFA is described to require two things at the very least: something a user has and something they know, such as an ID badge or phone and account password or PIN, respectively. For example, Google's two-factor authentication for Gmail accounts involves passing a password check and submitting the access code to the user's approved mobile phone device. This system ensures that hackers remain locked out of the account even when they get hold of the user's password unless they also acquire their phone. This authentication system with biometric identifiers is generally available on many laptops today, using either built-in fingerprint scanners or face recognition technology through the webcam.


4. Take precautions against unauthorised local access

Besides snooping, another potential threat is threat actors getting physical access to computers with sensitive information. This could happen in any place that is publicly accessible, from coworking spaces to office areas open to guests. One unsecured USB port is enough for intruders to interface with an organisation's network and steal sensitive data.

This method of physical hacking is more relevant than ever today and can lead to disastrous results. The most notable incident where this technique was used happened in 2012 when Iranian nuclear facilities were infected with the Stuxnet virus. Although facilities' systems were physically inaccessible from outside networks, they were bypassed when an employee used a malicious flash drive to interface with it. This led to other computers connected to the network becoming infected.

Many solutions have been proposed to combat this issue of physical access in organisations, such as only allowing access to systems to those that badge into the office/building. The benefits include incident awareness, building management systems, and those in the affected buildings.

Although this kind of access protection provides great security, not all companies, especially small businesses, can integrate such a complex system into their existing locations. Thankfully, there is a more cost-effective way of preventing unauthorised physical access, and that is by using a port blocker. A port blocker works by providing a physical barrier between your computer systems and any foreign or malicious objects.



Regarding online security, defensive measures should cover not just the digital aspect but also the physical one. In this rapidly evolving world of cybersecurity, keeping up with the best cybersecurity practices in both the online and real-world ensures organisations always have the upper hand.

If your organisation wants to improve its physical cyber security posture by purchasing a USB port blocker with key in Singapore, DBR Systems Pte Ltd is here to help. We are the leading distributor of effective and highly reliable USB and LAN port blockers in Singapore that ensures no unauthorised party gets access to your devices and networks, boosting your overall cyber defence posture. To learn more about our range of IT equipment and supplies, contact us at dbrsales@dbr-sys.com, or visit our store at 1 Rochor Canal Road, #02-30, Sim Lim Square.