Skip to main content
  • SHRM
  • Foundation
  • Executive network
  • CEO Circle
  • Linkage Logo
  • Store
  • Sign In
  • Account
    • Account
    • Logout
    • Global
    • India
    • MENA
SHRM Business
Find Your Solution
  • Membership
  • Certification
  • Team Training
  • Assessments
  • Events
  • News & Insights
Close
  • Membership
  • Certification
  • Team Training
  • Assessments
  • Events
  • News & Insights
  • Store
    • Global
    • India
    • MENA
  • Find Your Solution
  • SHRM
  • Foundation
  • Executive network
  • CEO Circle
  • Linkage Logo
SHRM Business
Sign In
  • Account
    • Account
    • Logout
Close

  1. Enterprise Solutions
  2. Enterprise Insights
  3. Cyber-Physical Security: Protect Your Business from New Threats
Share
  • Linked In
  • Facebook
  • Twitter
  • Email

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus convallis sem tellus, vitae egestas felis vestibule ut.


Error message details.

Copy button
Reuse Permissions

Request permission to republish or redistribute SHRM content and materials.


Learn More
Feature

Cyber-Physical Security: Protect Your Business from New Threats

March 19, 2025 | Ashleigh Popera

date center cyber and physical security

Cyberthreats are rapidly evolving, extending far beyond traditional phishing scams and credential theft. These growing threats could cost businesses around the world $15.63 trillion by 2029. Among the most pressing risks today is the emergence of cyber-physical threats.

Cyber-physical threats involve vulnerabilities that arise from the integration of digital systems, such as networks and software, with physical infrastructure, including machinery, security systems, data centers, and building control systems. Attacks are carried out by compromising either a digital or physical system and impacting the other in the process. This can involve:

  • Gaining access to digital systems to manipulate, disrupt, or damage physical devices and infrastructure.

  • Infiltrating physical infrastructure to steal, disrupt, or damage critical systems or sensitive data.

Like traditional cyberattacks, cyber-physical attacks can have devastating consequences for businesses. However, these attacks don’t just compromise sensitive data; they also put physical infrastructure and employee safety at risk. 

“When we think about security today, it’s clear that digital and physical protection are no longer distinctly separate worlds — they’re completely connected,” said Andy Biladeau, chief transformation officer at SHRM. Traditionally, physical security focused on protecting people and facilities, while cybersecurity safeguarded data and networks. However, the growing connectivity of physical infrastructures has blurred the lines between these two areas.

As businesses embrace digital transformation, interconnected devices such as internet-of-things (IoT) systems are becoming more prevalent. These networks of everyday devices, like sensors, security cameras, and heating or cooling systems, collect and share data over the internet for remote control and real-time monitoring. While these systems enhance efficiency and automate tasks, they can also become access points for cybercriminals. With more interconnected devices, businesses face an increased risk of breaches to both digital and physical systems, making cyber-physical attacks a critical threat.

As cybercriminals adopt new tactics and threats continue to evolve, security strategies must advance to overcome them. To safeguard both digital and physical assets, organizations must adopt an integrated approach to security that aligns cyber and physical strategies. By bridging this gap, businesses can strengthen resilience, ensure continuity, and enhance safety in the face of ever-evolving threats. 

Evolving Cyber-Physical Attacks

Cyberattacks have evolved far beyond data breaches. Modern cyber-physical attacks can take control of IoT systems, disrupt supply chains, and sabotage essential infrastructure, creating far-reaching consequences for organizations. 

Failure to secure critical systems can lead to: 

  • Operational disruptions: Cyber-physical attacks can shut down essential interconnected systems, leading to costly downtime and lost productivity.

  • Reputational damage: Customers, investors, and partners may lose trust in your business if you fail to protect sensitive data and systems.

  • Regulatory and legal liabilities: Security failures can lead to lawsuits, compliance violations, and hefty regulatory fines.

  • Employee safety risks: Cyber-physical attacks on building security or industrial controls can endanger employees and expose businesses to liability.

  • Financial burdens: The exorbitant costs of recovery efforts, legal fees, regulatory penalties, and potential ransom payments can overwhelm businesses.

Cyber-physical attacks can disrupt operations and business continuity by undermining physical devices and infrastructure. These breaches may include denial-of-service (DoS) attacks, where hackers overwhelm devices with traffic to render them unusable. This was the case in recent cyberattacks linked to China that compromised thousands of internet-connected devices, including routers and IoT devices.  

However, cyber-physical attacks can also lead to far more dangerous consequences that involve human safety. In 2020, a ransomware attack targeted a German hospital, taking down critical IT systems. This forced the facility to divert emergency patients, resulting in treatment delays that tragically contributed to a woman’s death.  

Last year, the U.S. sanctioned a Chinese cybersecurity company after one of its employees deployed malicious software that compromised roughly 81,000 firewalls at global organizations in 2020. Thirty-six of those firewalls were at U.S. critical infrastructure companies, including an energy company actively engaged in a drilling operation. The U.S. Treasury Department condemned the attack as a direct threat to human life, noting that if the attack hadn’t been stopped, it could have caused oil rigs to malfunction, putting workers’ lives at serious risk.

Businesses also face an increased risk of cybercriminals infiltrating partners, service providers, or third-party vendors to compromise factories, logistics networks, and entire business operations.

In 2021, the DarkSide hacker group launched a ransomware cyberattack on Colonial Pipeline, the largest fuel pipeline operator in the U.S. To prevent the ransomware from spreading to operational systems, Colonial Pipeline was forced to shut down operations, leading the U.S. government to declare a state of emergency due to widespread fuel shortages up and down the East Coast.

Emerging Threat: Office Breaches

Theresa Payton, CEO of cybersecurity company Fortalice Solutions and former White House CIO, warns of emerging threats involving employees and company buildings.  
 
Payton predicts that cybercriminals may begin to digitally attack office spaces and trap workers for ransom. “If you have any buildings that are smart buildings that have lots of internet-of-things devices installed, my prediction is by the end of 2025, ransomware syndicates are going to move to buildings,” she said on SHRM’s Tomorrowist podcast. “[They could] lock people in and hold them for ransom, and not let them out until you pay the ransom.”

 

 

Conversely, cybercriminals may take the reverse approach — infiltrating office spaces to access secure digital systems. One common tactic is a malicious USB drop — leaving an infected USB drive in an office or parking lot, hoping someone will plug it in. This seemingly harmless action can trigger severe consequences, from data breaches to complete system shutdowns.

A striking example of this tactic was the Stuxnet computer worm, which famously disrupted Iran’s nuclear program. By infecting industrial control systems via a USB drive, Stuxnet caused centrifuges to malfunction, effectively sabotaging uranium enrichment processes and setting back Iran’s nuclear capabilities.

Siloed Security Increases Risk

As companies embrace digital transformation and more advanced, interconnected technologies, risks grow and only become more complex. Maintaining separate cyber and physical security initiatives may lead to gaps in threat detection and slower responses to active, interconnected threats. Despite robust physical security measures, having inadequate cybersecurity protections may undermine efforts, and vice versa. For example, with the rise of smart buildings and IoT systems, physical security devices are often network-connected but lack proper cybersecurity protections, making businesses more vulnerable to attacks.

An Integrated Approach to Cyber and Physical Security

To keep pace with today’s rapidly evolving threats and successfully adapt to digital transformation, businesses should integrate cybersecurity and physical security measures, Biladeau said. 

“Security strategies are the left and right boundaries of any digital strategy. Whether apps or infrastructure, IT policies need to be woven into IT operations workflows to be effective,” he said. 

A comprehensive approach that merges robust physical security with advanced cybersecurity measures ensures all vulnerabilities and entry points are effectively safeguarded. By adopting this strategy, organizations can identify weaknesses, mitigate risks, and empower their teams to respond proactively to potential breaches. 

Tactical Steps for Integrating Security Strategies

1. Establish a Cross-Functional Security Team

To stay ahead of evolving threats, businesses should form cross-functional security teams that integrate IT, operations, and physical security. These teams should regularly conduct risk assessments to identify system vulnerabilities, access controls, and emerging security trends. This includes taking a step back and asking, “What systems are we relying on, and how might they be creating loopholes we didn’t intend?” Biladeau said. “It’s a reflective process — one that pushes us to uncover those hidden ‘back doors’ that could be working against the outcomes we’re striving for.”

Today, physical security measures, such as access controls and badging, are closely linked to IT systems and operations. By aligning teams and strategies, and proactively implementing measures to protect systems, businesses can ensure seamless protection with no gaps in threat detection. 

2. Build a Culture of Security Awareness 

Security awareness and education are essential for maintaining strong security. Holding monthly or quarterly training sessions helps employees stay aware of evolving threats and change their behaviors to reduce risk. Consistent phishing campaigns allow businesses to test employees, track results, and improve their skills and responses. Practical drills and hands-on training can help employees feel confident in how to respond in an emergency.

Beyond training, building a strong culture of security is just as crucial. Businesses should educate employees on the importance of practices such as always wearing their badges and using two-factor authentication. Create an environment where employees feel empowered to promptly report any security concerns without hesitation. By fostering a proactive mindset, organizations can strengthen security, reduce risks, and build a workplace where everyone takes responsibility for safety.

3. Create a Crisis Management Plan

“On the security side, imposters will get better and better at accessing our systems. This means that that we must be prepared to respond effectively when attacks inevitably happen,” Biladeau said. Crisis management teams are becoming increasingly important as organizations face growing security threats. These teams should evaluate potential crises, assess their likelihood, and establish clear response plans.

Strong communication and coordination are key to responding quickly and effectively when a crisis occurs. A call tree system should be in place to determine who to alert in an emergency. If necessary, organizations must be able to shut down system access, restrict building entry, and disable employee badges to prevent further risk.

At the director level, crisis management training is essential. Many security incidents involve insiders such as current or former employees, making it crucial to recognize warning signs and support individuals who may pose a risk. Leaders should develop evacuation plans, identify potential threats, and align teams with security expectations to strengthen organizational preparedness and resilience.

Building Resilient Organizations Through Comprehensive Security Strategies

In an increasingly interconnected world, the line between cyber and physical security has all but disappeared. As businesses continue to adopt IoT systems and advanced technologies, they are not only enhancing operations, but also expanding vulnerabilities in ways that traditional, siloed security strategies can no longer protect against.

The threat is real and growing — whether it’s ransomware shutting down fuel pipelines, malicious actors exploiting IoT vulnerabilities to disrupt infrastructure, or insiders leveraging weak physical access controls to compromise networks. Every entry point, digital or physical, represents a potential vulnerability if organizations fail to adopt a cohesive, integrated approach. 

By aligning cyber and physical security measures, fostering cross-functional collaboration, training employees to recognize evolving threats, and preparing crisis management protocols, businesses can strengthen resilience, reduce risk, and safeguard both people and data.

To safeguard your organization from cyber-physical threats, explore the SHRM Cyber Resource Kit. It offers valuable tools and insights to help you strengthen your cybersecurity strategies and safeguard both your digital and physical assets. Learn more and get your kit today.

Cybersecurity
Data Security
Leadership & Navigation
Workplace Security

Artificial Intelligence in the Workplace

​An organization run by AI is not a futuristic concept. Such technology is already a part of many workplaces and will continue to shape the labor market and HR. Here's how employers and employees can successfully manage generative AI and other AI-powered systems.



Related Content

Kelly Dobbs Bunting speaks onstage at SHRM24
(opens in a new tab)
News
Why AI+HI Is Essential to Compliance

HR must always include human intelligence and oversight of AI in decision-making in hiring and firing, a legal expert said at SHRM24. She added that HR can ensure compliance by meeting the strictest AI standards, which will be in Colorado’s upcoming AI law.

(opens in a new tab)
News
A 4-Day Workweek? AI-Fueled Efficiencies Could Make It Happen

The proliferation of artificial intelligence in the workplace, and the ensuing expected increase in productivity and efficiency, could help usher in the four-day workweek, some experts predict.

(opens in a new tab)
News
How One Company Uses Digital Tools to Boost Employee Well-Being

Learn how Marsh McLennan successfully boosts staff well-being with digital tools, improving productivity and work satisfaction for more than 20,000 employees.

HR Daily Newsletter

Stay up to date with the latest HR news, trends, and expert advice each business day.

Success title

Success caption

Manage Subscriptions
  • About SHRM
  • Careers at SHRM
  • Press Room
  • Copyright & Permissions

Email: SHRM.MEA@shrm.org
Landline: +971 43649464

SHRM KSA Office (Riyadh)
+966507266968

SHRM UAE Office (Dubai)
+971581101786

Follow Us
  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • SHRM Newsletters
  • Ask An Advisor

© 2025 SHRM. All Rights Reserved

SHRM provides content as a service to its readers and members. It does not offer legal advice, and cannot guarantee the accuracy or suitability of its content for a particular purpose. Disclaimer


  1. Privacy Policy

  2. Terms of Use

  3. Accessibility

Join SHRM for Exclusive Access to Member Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member?
Free Article
Limit Reached

Get unlimited access to articles and member-exclusive resources.

You've reached the limit of 1 free article this month. Join to access unlimited articles and member-only resources.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join the Executive Network and enjoy unlimited content.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join and enjoy unlimited access to SHRM Executive Network Content.

Already a member?
Unlock Your Career with SHRM Membership

Please enjoy this free resource! Join SHRM for unlimited access to exclusive articles and tools.

Already a member?

Your membership is almost expired! Renew today for unlimited access to member content.

Renew now

Your membership has expired. Renew today for unlimited access to member content.

Renew Now

Your Executive Network membership is nearing its expiration. Renew now to maintain access.

Renew Now

Your membership has expired. Renew your Executive Network benefits today.

Renew Now