Lock Bumping and IT Department…the weakest link

There was a great blog post that had such a unique perspective we just had to share it with our customers and audience. It was titled, “Lock Bumping” and was written on the IT Generalist blog.

Many people have now heard of a technique that is out there called “Lock Bumping” as a way of opening a door.  Essentially, it is inserting the key into the lock and then “bumping” it hard enough where the tumblers move and the lock is now open.  This is much more common with the cheaper locks on the market today and if you have a solid lock, like one from Medeco your likelihood is significantly reduced.  The blog goes on to point out that if you buy a cheap lock, you can expect to get it bumped.

Now here is the interesting point they were making in the post.  You can spend tens of thousands of dollars on IT, including security systems on the computers and servers but if the cyber thief can gain access to the computers they can do just about anything.  So while all this time and money is spent on “locking down” your computer systems, minimal amount of money is being spent on the lock to keep them out.  As noted in the article, these locks can be “bumped” in as little as 60 seconds.   So it doesn’t make sense to us to have all this security being spent to keep people out of your information and employee accounts, only to allow them much easier access through your doors.

Whether you use Watson Security advisors or someone else, get someone to come in who knows all about helping you build a “security strategy” so you are spending your money wisely and you are fixing the weakest link in your overall security systems.  Stop people or at least make it difficult for them to gain entry into your most valuable asset – your information.  Put a plan together where you look for these “weak links” in your system so you can avoid losing your most valuable assets just because you “didn’t know any better.”

16 Responses to Lock Bumping and IT Department…the weakest link

  1. I’ve read all about the ease of lock bumping and I want to say that it’s a big scam by locksmiths to scare you into buying expensive locks that you don’t need! I have studied the so called lock bumping technique, and have not been abel to open any lock. It is much easier to pick a lock using the traditional tichniques, that locksmiths use.

  2. We all know the risks of our houses being attacked by a burglar; instead of worrying all the time about the potential burglars who might come into your home, it is for the best that you go online and discover the range of home security – security systems offered by Apex Direct. You will see how the security systems guarantee all-night monitoring of the desired property, that they come with sensors for both the door and the windows (detecting any kind of movement) and also with a high decibel siren. Add to that the detection of glass breaking, the medical emergency protection and the keychain remote arming – and you will have a complete package. You will be able to sleep comfortably at night, knowing that your house is protected ag

  3. Here are two popular methods that companies of carpet cleaning in Murrieta employ.
    This spray will chase the fleas away thanks to the pennyroyal.
    Avooid rubbing as this may cause the stain to spread.

  4. Low security locks are always the old fashioned locks and they are tend to be changed according to the new trends and technology they follow. For instance one can Google it and find out which locks are best for them and however there are locksmiths which are able to help you for this particular kind of requirement of anti burglar locks.

  5. New trend Security now a day’s much useful. They build more features on it and much secured in terms of securing something in your house or in your family. In Addition, Computers security is kinda risky. Lots of cracker can easily hack those less secured system or sites and with those who made highly secured system won’t automatically hack by not so oh professional hackers.

  6. They can either go into business with other lawyers or specialize in compensation cases for clients.
    But areas that even the most aggressive collectors usually can’t touch include Social Security benefits, public
    assistance benefits such as food stamps or cash aid and unemployment benefits.
    The person to contact the police should inform that people are injured, and
    if possible, the number of persons injured so that there will
    be enough emergency personnel to respond to the accident.

  7. Great post.I was checking constantly this blolg and I am impressed!

    Very helpful info specially the last part :) I care ffor such information much.

    I was looking for this particular info for a long time.
    Thank you and good luck.

  8. Hiya there…. I’ve crafted a exclusive Search engine optimization program that are able to rank any website page in practically any business (whether it is
    a competitive niche for instance acai berry) to position easily.
    Google or yahoo isn’t going to find out about as we
    use distinctive ways to avoid traces. Do you think you’re looking to
    test it completely free?

  9. It’s awesome to go to see this web site and reading the views of
    all colleagues concerning this post, while I am also keen of getting

  10. Nice post. I was checking continuously this blog and I’m impressed!
    Very helpful information specifically the closing phase :
    ) I deal with such information much. I was looking for this
    certain information for a long time. Thank you and good luck.

  11. Thanks for every other wonderful article. Where else may
    just anyone get that type of info in such an ideal means of writing?
    I have a presentation subsequent week, and I’m on the search for such info.

  12. Hello there, You have done a great job. I will definitely digg it and personally suggest to
    my friends. I’m sure they will be benefited from this site.

Leave a reply