Time
2 hours 33 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello, everyone. And welcome back to cyber is and user physical security. Course
00:05
I'm your instructor. Corey holds ER, and this is less than 3.3 company assets.
00:14
The learning objectives for this listeners follows First will discuss the importance of securing company assets.
00:21
Then we'll talk about what an asset management system is and will finish up discussing how to secure incoming and outgoing shipment of goods from your business
00:36
assets of the lifeblood of any company. Second, Onley to its employees assets represent equipment, machinery that produced the goods and services that a company
00:49
basically gets all of its income. From in 2018 alone, U S businesses lost a combined $50 billion in assets. Now this could have been from any number of reasons theft, destruction of property, natural disasters and and the like.
01:07
But it shows how
01:08
crippling the loss of assets can be to any business on a large scale.
01:18
So how do we secure assets? Well, you can see from the imagery here. It basically comes down to having an asset management system and also having security measures in place at each workstation.
01:32
Now, I said, inventory is knowing exactly what the company has
01:37
company. Can't you know a company values itself based on everything it has not only the products that produces, but the equipment that it has at its disposal to to actually execute its business practices.
01:49
There's also an important aspect of asset movement,
01:52
you know,
01:53
today a computer, maybe in Joes office.
01:57
But because of upgrades,
01:59
that computer is now in a storeroom or it's been
02:02
given over to another user because they need to travel in business and they need a laptop. So knowing where your equipment is at all times is important and critical piece of asset management.
02:15
And it's also about theft protection.
02:16
You know, we have with the Kensington lock that's displayed there in the lower right hand corner blocks like those ensure that someone isn't going to pick up a laptop, shove it in the bag and walk out of the building with it.
02:30
That computer could contain personal identifying information about employees it could and hold trade secrets for how business processes air performed or how items were produced. So it's it's critical that the company has positive control over its equipment at all time.
02:50
Now,
02:52
in some of the government places that I've worked.
02:54
One of the important things they do is they actually give each use your ownership of that item not so much that it's theirs to do with as they please. But they are accountable for that piece of equipment. And that's an aspect also of asset management System is knowing which person has wish assets at their disposal.
03:14
So when it comes time to inventory,
03:17
they know
03:19
Joe has this computer, and this computer has this serial number. Okay, I can verify it. He's good to go. That cuts down on theft. That also means you know where equipment is Every day.
03:35
Now we get to things like shipments. You know, equipment come like I said,
03:39
part of the lifeblood of a business is the shipping out of its products and the income intake of items. Whether it's Mitt Sabraw materials, it's computer equipment for for a new project, what have you
03:53
And if you remember, if
03:55
if you're like me a little bit older, you remember a lot of scares. After 9 11 where there were
04:03
strange packages being sent to companies and Congress and
04:08
leadership all over the world where they contained, they were suspicious packages,
04:13
maybe containing concerns of anthrax. And like so, one of things we do as we receive or send out is a tracking system. Now it's easy to track packages is they travel from one location to another,
04:29
while the parcel services do that for you. But it's also knowing how to recognize what a suspicious package looks like, and this is important. You can see from some of the images. Is the image on the side of this slide. You can see how it discusses. Look for things like proper postage,
04:47
properly addressed envelopes with things like their spelling error free because that's a common error.
04:54
Someone sending you a letter at work, They probably should know how to spell your name,
04:59
even my name. My name gets spelled wrong all the time, but it's something to look for
05:02
you you have here. In this example. The package has some grease spots or some court sort of discoloration. Those are all telltale signs and improper return addresses. Another one. All of these things can tell us that,
05:17
or should root
05:19
create alert for us in our head? Raised that red flag to say there's something suspicious about this package. then I'm not going to accept it. And maybe we need to have
05:30
security involved to ensure that the item is properly
05:35
monitored and
05:38
please, God, never necessary. But possibly that we get law enforcement involved.
05:46
So let's do a quick check on learning about asset management.
05:50
I'll read you the question and the four possible answers. I'll give you about 20 seconds to answer, and then I'll explain why the right answer is right and wrong answers or room.
06:00
In 2018 U S businesses lost. How many U. S. Dollars in assets
06:06
was it? 50 million? 50 billion?
06:10
Ah, 100 million or 25 billion.
06:21
And the answer is
06:24
$50 billion.
06:30
In this lesson, we discussed three topics. First, the importance of securing corporate assets.
06:36
Second, what an asset management system is and its importance.
06:41
And finally, we concluded with discussing the securing of incoming and outgoing shipments and what to look for and suspicious packages
06:49
I'm in start to Korea holds her. Thank you for taking this lesson. I look forward to seeing you the next one

Up Next

End User Physical Security

This course will introduce you to physical security and why it is important. We’ll do some time travel and go back in time to discuss ancient physical security methods.

Instructed By

Instructor Profile Image
Corey Holzer
Information Systems Engineer
Instructor