Business Protection Through Your Physical Environment
Defend Your Data.
Dox Electronics provides IT training that covers the physical security of your business or organization to best protect your data, clients, and company. In this day and age of cyber security, the attention of many IT administrators, facilities personnel, and business owners is focused on digital security. While this is incredibly important, that focus leaves a hole in the IT security of businesses that thieves and bad actors can exploit to your detriment.
Our seasoned experts at Dox provide hands-on training and safety classes centered on the physical security of your business to address threats that often go unnoticed. Such threats can lead to theft, breaches, and the loss of proprietary data that can have a truly devastating impact on your business, your reputation, and that of your clients. In our physical IT security training, you’ll learn how to secure your physical environment and assets to improve your data security.
If it's not exceptional, it's not Dox.
What You'll Learn.
With physical IT security training from Dox, you’ll learn how people pick locks, get into doors and windows, and how easy it is to break into most business facilities such as computer labs. Some of the topics we will discuss and address in the course include:
Covert Methods of Entry
Covert Methods of Exit
Defeating Lock Technology
You’ll also learn how thieves can easily pick a wide variety of locks with just seconds’ time so you can better secure your business. You’ll learn how they can defeat lock technologies, infiltrate your facility or commercial building, and gain entry through specialized entry techniques. With this training we provide the knowledge so you can better identify your business’s vulnerabilities where its physical environment is concerned, which means better business, network, and data protection.
We provide you with all of the tools as you experience hands-on training in lock picking. You will learn how simple it really is to defeat a wide variety of locks including, but not limited to:
Interior Door Locks
Exterior Door Locks
Active Duty Military Personnel
Participants will also learn about shimming, bumping, loiding, and bypassing locks through our hands-on specialized training. Our physical IT security training addresses most regulatory requirements for both state and federal IT regulations. This course can help your business or agency in achieving regulatory compliance.
Our Training Format.
Our physical IT security training is hosted in a classroom setting and is capped at 25 participants to provide a personalized, hands-on learning experience. The course is taught over a two-day period at our Rochester headquarters in New York State. Lunch is included in the course fee for both days. The course will include the following elements:
Graduates of the course will gain a comprehensive knowledge and understanding of the physical security required for the best business security. They will receive a certificate of completion at the end of the course that will meet or exceed the requirements of nearly every state and federal IT regulatory requirement.
Meet Our Expert Instructor.
Ken Michael founded Dox in 1982 as a computer repair company but quickly grew and expanded services as the market demand called for it. Today, Dox is focused on cyber security of businesses and organizations including the physical security required for data protection.
Today, Ken is the vice president of Dox Electronics and is a recognized expert in the field of cyber security. He and his team are paid to break into organizations to test their security and offer remedies for the vulnerabilities they identify.
As a certified security expert and frequent keynote speaker at security events across the country, Ken teaches our physical IT security course so you can better understand your company’s vulnerabilities and address them before a breach occurs. His certifications include CISSP, CRISC, CISA, and he is a Certified Security Analyst.
At Dox, we provide the physical IT security training your business needs to improve your network protection, data privacy, and commercial security. Learn how to use technology to limit access to your business and improve your overall network security in this short, exciting course.