Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Education & TrainingPhysical SecurityCybersecurity News

How to Set Fire to All Your Servers

Compromised data is detrimental, no matter how it's compromised… including by a physical intruder.

By Carrie Lowther
SEC1118-edu-Feat-slide1_900px
SEC1118-edu-slide2_900px

Carrie Lowther, president and co-founder of Great Lakes Case & Cabinet (GLCC) since 1985.

SEC1118-edu-Feat-slide1_900px
SEC1118-edu-slide2_900px
November 12, 2018

Does the name Brian Howard ring any bells? It should. Howard was a contractor for the FAA who took down a critical piece of infrastructure in our nation’s air space. But he didn’t hack into their system to do it. No password stealing or phishing attempts. Instead, he walked right through the door, cut key telecommunications cables, doused them in gasoline and lit them on fire. The fire shut down the center for 17 days and delayed 11,027 flights. Airlines estimated the incident cost them $350 million.

In another incident, a Chicago colocation facility was broken into four times within two years. Thieves literally cut a hole through a wall and walked away with approximately $15,000 worth of servers every time. That cost doesn’t even begin to calculate the damage done to the building, the company’s reputation, or by the loss of data.

Data security isn’t just a software issue. It’s far more physical than you think. While the discussions around cybersecurity awareness are primarily centered around workforce awareness, firewalls, passwords and mysterious black boxes, it’s important to note that a staggering amount of security breaches don’t involve logins, passwords or code at all. They involve people, hardware and a deafening lack of preparedness. In the age of all things cyber, are we dropping the ball when it comes to the physical threat?

I think the answer is yes. 

Think about it: What are the big-ticket items on your 2019 security budget? You’re probably making sure you have the most recent enterprise-grade network tools to ensure bad actors stay out of your company’s systems. You’re probably budgeting for intrusion detection technology, firewalls, analysis and workforce protection software. But do you have any funds allocated for data center access and security? Biometrics? Enclosure security? And apart from the CAPEX side of things, are you developing organization-wide standard operating procedures and access policies for your physical spaces?

Or is this another year where you just issue people a badge and a PIN number and hope for the best?

The threat is within your walls. And all signs are pointing to the fact that the insider threat is not going away. According to Dtex Systems’ 2017 Insider Threat Intelligence Report, average losses to insider attacks exceed $4 million per year. But it’s not always what you think: 68 percent of insider incidents were caused by employee or contractor negligence. So even if you could never imagine one of your trusted employees taking down or stealing your data on purpose, your workforce could still be putting your company at risk. 

At the end of the day, it doesn’t matter if your data is compromised by high-tech cyber operators, by someone who disguises themselves as a police officer to enter your building, or by an employee who unintentionally leaves a door unlocked for intruders. Compromised data is detrimental no matter how it’s compromised. In fact, in 2017, the average cost of a data breach in the U.S. was $7.35 million.

 How’s that number for your 2019 budget?

But here’s some good news. There are measures you can take right now to protect your company from the physical threat. From something as simple as implementing stricter access policies and ensuring all former employees no longer have access to the building to more high-tech solutions such as biometric handles for your enclosures that use RFID cards and ask for fingerprint authentication in order to access a server, it’s up to you as an information security stakeholder to get prepared now…before something happens.  

I challenge you to take a hard look at your physical security strategy and ask yourself if you’re glossing over the physical for the sake of the virtual. While they’re both important, it’s critical to ensure that you’re not leaving your doors wide open – literally – to a breach.

 


About the Author

Carrie Lowther has served as president and co-founder of Great Lakes Case & Cabinet (GLCC) since 1985. From 1976-1985, she held several positions with General Telephone Company of Pennsylvania.

KEYWORDS: cyber security awareness data center security data security insider threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec1118 edu slide2 900px

Carrie Lowther is a contributing writer and has served as president and co-founder of Great Lakes Case & Cabinet (GLCC) since 1985. From 1976-1985, he held several positions with General Telephone Company of Pennsylvania.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-blog

    How to Detect & Prevent Cyberattackers from Exploiting Web Servers via Web Shell Malware

    See More
  • AI public safety freepik

    How to safeguard and optimize your assets through IoT and AI

    See More
  • cybersecurity

    How to select a cybersecurity framework to protect your greatest assets: People, property and data

    See More

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing