Sledgehammer to a data center

So you’ve locked down you network and have a great ISMS program protecting you from the electronic threats. But what if steal-to-order organised criminals take a sledge hammer to the …