Much has changed in visitor management procedures and policies since the days of entering a visitor’s name in the log book and slapping on a sticky badge with a handwritten name on it. Often, visitors were not even asked for identification, and there was no way to track or confirm if or when they left the building.
There are myriad security risks in giving third-party vendors access to your network and data. If a third party gets hacked, your company can lose vital business data, and confidential employee information can be compromised.
The Defense Department may now officials exclude contractors or subcontractors from receiving information technology contracts based on the risk their supply chain poses to national security systems, Fierce Government reports.
For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!