Known as Music City USA, Nashville attracts artists from nearly every genre of music and from all corners of the globe. The community boasts approximately 200 recording studios as well as the supporting spinoff industries such as booking agencies, publishing companies, trade publications and more.
Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations and common courtesy is that they open your building to undocumented and unauthorized entry by individuals who could intend harm to your property and employees.
Healthcare security is changing. As more and more hospitals form or join health systems or implement the Affordable Care Act, the standardization of security officer services has many advantages. The need for greater value from service providers, more efficient programs, consistent protocols for staff and patients and an increasing focus on both safety and security are positioning standardization of security services as a critical solution for health systems.
Vanderbilt University has earned many distinctions, including Princeton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.
Since 1955 McDonald’s has been proud to serve the world some of its favorite food. Along the way, McDonald’s not only lived through history, but created it: from drive-thru restaurants, to Chicken McNuggets, to college credits from Hamburger University and much more.
Honeywell is a Fortune 100 diversified technology and manufacturing leader, serving customers worldwide with aerospace products and services; control technologies for buildings, homes and industry; turbochargers; and performance materials. With such diversity of opportunity at Honeywell, having the right controls and security in place is critical to long-term success.
There is a common plot line that underlies most of the breach stories in the news. Software written by bad guys gets into places on the corporate network where it shouldn’t be. It looks around, finds vulnerable systems, grabs valuable data and transmits it off the network. The term most commonly used to describe this behavior is Advanced Persistent Threat (APT).
Training videos can be both effective and fun if you have some imagination and are open to a different approach. The safety and security video that Kishwaukee College in Malta, Illinois, recently developed proves that point.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.