3.4 Summary

All the technological security marvels in the world are useless without proper accompanying physical security. While most companies implement some form of physical security, few take into account the many security vulnerabilities that exist in their environment. Take the time to think about physical security, document the vulnerabilities in your environment, and make business decisions about how to prevent those vulnerabilities from compromising the security of your company's information systems.