Now is the time to consider dismantling the barriers that often exist between IT and physical security teams, so that evolving cyber risks can be tackled more effectivelyFor example, Verizon’s 2012 data breach investigations report found that ten per cent of breaches involve some form of physical attack, while a further five per cent result from ‘privilege misuse’. In 2009, the US National Nuclear Security Administration (NNSA) criticised Los Alamos National Security (LANS), the contractor responsible for security at the Los Alamos National Laboratory, for its apparent mishandling of computer thefts from the facility’s weapons laboratory However, the report highlighted the risks of dealing with cyber security in isolation, where the theft of computers were treated as a standalone ‘property management issue’, which uncovered “several property management, accountability, incident reporting and cyber security concerns”.