NIS2

Cybersecurity Without Physical Security Is Full of Holes

Companies are investing more and more in digital defences, but sometimes forget the physical side of security. Yet this is often where the first breach occurs. Educate your staff, implement clear policies, and test regularly. Because those who only arm themselves digitally overlook the fact that hackers sometimes simply walk through the front door.

Hacktools: From Hollywood to Office Reality – Hacked in 5 Seconds

In films, we see spies plug in a USB stick, a light flashes, and the computer is taken over. But this is no longer fiction. These tools emulate keyboards and execute scripts within seconds—without the victim noticing a thing. USB devices from Keelog or HAK5 can be bought online legally, starting from just $40.

Physical access is one of the most critical gateways to digital systems. As soon as someone gains unauthorised access to devices, data carriers, or network points, a cyber incident via a USB hack stick is just around the corner.

Real-World Examples of Physical Cyber Attacks

  1. USB Attacks: An attacker plugs a seemingly harmless USB stick into a computer. In reality, it’s a sophisticated device that records keystrokes, accesses the camera or microphone, and installs malware remotely via WiFi, 4G, or other connections.
  2. Network Taps: Someone secretly connects a device to the network that forwards all data traffic to a remote laptop outside the building.
  3. Theft of Unencrypted Data: If a backup drive or NAS is stolen and not encrypted, all data is freely accessible to the thief.
  4. Stolen Servers: Not only is the data compromised, but login credentials can also be retrieved and misused.
  5. Access control—think badges, locks, and alarm systems—is crucial. This also means ensuring access rights are revoked promptly when someone leaves the organisation.

Social Engineering at the Front Door

Another underestimated risk is tailgating: an unauthorised person who quietly follows an employee into the building. Often disguised as a technician with full hands or a helpful visitor, these attackers exploit our social instinct to be accommodating.

Guidelines to Minimise Physical Cyber Risks

  1. Spot the Unusual: Encourage staff to report suspicious situations, introduce a badge system, and require employees to report unknown individuals without badges.
  2. Secure Sensitive Areas: Servers, network equipment, and backups should be kept under lock and key.
  3. Exit Policy: Ensure access rights are immediately revoked when employees leave.
  4. Secure Visitor Areas: Prevent access to open network ports in publicly accessible areas.
  5. Protect Network Cables: Always install cables inside buildings and secure them against tampering.
  6. Limit Access to Legacy Systems: Physically isolate systems that no longer receive updates.
  7. USB Policy: Unknown USB sticks should never be plugged in—direct them immediately to IT.

NIS2 is an all-hazards directive. Physical security will soon be mandatory for NIS2 entities.

 

Scroll to Top