80% of IT administrators are not sufficiently informed and quickly enough
about physical threats
Check in 10 simple questions whether you belong
Check your server room >
Rooms for IT use should be produced or adapted to meet the special requirements and have the following characteristics: Fire protecting doors and corresponding fire protection measures, secured windows / doors, adapted electric circuits, no water carrying pipes, no unrelated additional use.
Do you have a server room or computer centre specially prepared for IT?
Do you receive direct reports of fires and can you take immediate action?
60% of fires occur in electrical systems and appliances and develop slowly through braising. Therefore, electrical distribution systems, UPS systems, air conditioning systems and power supplies are potential fire hazards.
If the room temperature rises, are you informed in good time so that you can take countermeasures? Do you know about the indoor climate?
If the air conditioning system fails, the servers can overheat; this usually leads to a total failure of the IT within a few hours. Other critical conditions are too high humidity or condensation after air conditioning failuresRestartYesNo
Do you get water leaks from burst pipes or a faulty air conditioning system reported before damage occurs?
The penetration of water into server rooms due to flooding, defects in heating systems, air conditioning units, etc. YesNoRestart
leads to a total failure of the IT.
In the event of a power failure, do you know how long it will last and whether your UPS is working correctly?
In the event of a power failure, the UPS may experience unexpected disturbances, resulting in a total failure of the IT. Voltage fluctuations are often also caused by industrial plants and can lead to UPS or power supply unit faults.YesNoRestart
Have you taken measures against burglaries and can you react immediately?
Burglary or theft are the most obvious threats. In addition to the physical theft of hardware, logical accesses and attacks can also occur. Open ports or accessible consoles are critical points of attack here.YesNoRestart
Can you trace who, when and how long someone was in the room at any given time?
IT rooms are to be adequately secured against unauthorized access and, if possible, documented. Very often attacks on IT take place from within the company itself.YesNoRestart
Are you aware of failures of active components or network connections at any time?
The failure of active or passive components such as routers, switches, telephone systems can lead to massive disruption of the IT infrastructure. Company failures of a few hours can quickly cause high costs.YesNoRestart
Do you receive early reports of the effects of human error and can these reports be transmitted independently of your IT?
Incorrect operation, open windows, disregard of technical instructions, clumsy behavior - all this regularly leads to expensive IT failures. Organizational measures help to avoid them. A fast and redundant notification to several people in case of a failure is important.YesNoRestart
Can you trace and reconstruct events at any time (even over several months) to avoid future errors?
Documentation and recording of normal and critical system statuses over months or years is required by many QA and certification systems. A complete documentation possibly releases you from liability risks.YesNoRestart
Your physical IT infrastructure
has the following security level:
0 % Get advice now
+49 6781 56 25 10
Insufficient protection against basic physical risks.
Basic protection, but with high potential for improvement
Already good protection. The missing points should be analyzed for further improvement
Congratulations, perfect protection. There is currently no need for action.