In the January 2014 issue of Security Magazine, read about the role of the Chief Information Security Officer and how important they are to your company. Find out how to prepare your company for a natural disaster, training your security officers to spot a fake ID, and read about the latest trends in security for the New Year! Also, find out how jury settlements have a big impact on your enterprise security.
The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.
To most people, the term “access control” refers to beeping key-card readers, little lights turning from red to green, doors unlocking and turnstiles opening, but access control also happens to be one of the most important duties that a security officer is tasked with.
RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.
January 6, 2014
In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.
A security executive’s primary strategy should be to prevent lawsuits from happening, so hiring practices and vetting of security firm partners are the first defense. All security officers must be subjected to criminal background and employment history checks.
Let’s start with the good news. Malicious insider activity is relatively rare. Unfortunately, even though outsiders account for 85 percent of cybersecurity incidents, the damage often is substantially greater when an insider strikes.
Small business doesn’t necessarily mean small data.
January 6, 2014
Small business doesn’t necessarily mean small data. In fact, according to Michael Bruemmer, vice president at Experian Data Breach Resolution, thieves prefer to target small- to medium–sized businesses (SMBs) because many lack the resources or expertise to manage cybersecurity. Retailers are especially easy targets for cybercriminals who look to hijack credit card data, but customers aren’t the only victims.
During the past 20 years, product technology within the analog security video industry had been very stable, with only minor product advances.
January 6, 2014
In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this historical norm. The needs of small and midsized businesses (SMBs) are moving in the opposite direction of enterprises, where the surveillance needs are getting more closely aligned with the enterprise’s IT requirements.
Start off the new year with an exclusive look at the innovative security technology in the U.S. Bank Stadium in Minneapolis in our annual Security Technology & Innovations Report. This issue also includes guides for retail security leaders on video surveillance techniques, tips for retrofitting your access control systems, and recommendations for the new U.S. president on cybersecurity and terrorism.