Good old fashioned cycling is enjoying something of a renaissance at present, with people across the world taking to the pedals in search of cheap, environmentally friendly travel. In the UK, few groups have embraced the revolution as whole heartedly as commuters.
Nearly 72 percent of U.S. federal actions involving employee theft in 2014 involved small businesses – organizations with fewer than 500 employees, according to the 2015 Hiscox Embezzlement Watchlist. Within that group, four of every five victim organizations had fewer than 100 employees, and more than half had fewer than 25 employees.
Mention cybersecurity and immediate thoughts turn to technical controls such as firewalls, endpoint detection and patching systems. While these and other technical controls certainly are necessary, they must work in tandem with administrative and physical controls in order to form a mature risk mitigation program. This month, we will explore some of the physical aspects of cyber risk management, which inherently relies upon on-site security personnel and employee training for proper execution.
If you figure that a better economy these days means less metal theft, think again. Theft of copper, aluminum and other metals continues as people see a way to easily make money to buy drugs or other uses.
In June 2014, Sy Alli made a career move that was controversial, daring and, in his opinion, potentially ruining to his future prospects: He became the first director of corporate security for a marijuana-based enterprise: Dixie Brands, Inc.
Three-million offensesagainst UK retailers in 2014 racked up direct costs of £603 million ($913 million U.S.) in 2014 – while the number of in-store thefts fell by four percent, the value per incident climbed 36 percent.
Security Needs to Better Protect Automated Telephone Systems
December 27, 2013
With break ins of enterprise computer networks grabbing the headlines, there is a chance that chief security officers at some corporations and government agencies could be neglecting the lowly office phone. And that may be a costly mistake.
Celebrate 30 years of OSAC's Information-Sharing Partnership. Also, learn how to create risk-aware culture through privacy by design and how to protect assests with temporary security installations. Check out Security's October issue for all this and more!