Much has changed in visitor management procedures and policies since the days of entering a visitor’s name in the log book and slapping on a sticky badge with a handwritten name on it. Often, visitors were not even asked for identification, and there was no way to track or confirm if or when they left the building.
Threated by the increasing ingenuity of hackers in addition to the already problematic challenges of employee theft or industrial espionage, organizations today are taking serious steps to improve protection of their networks and data centers.
While some students are calling the new ID badge policy a threat against their rights, university officials are sticking with their policy of requiring students and faculty to wear their badges at all times.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.