In the May issue of Security Magazine, read about how the security talent gap and how it is the next big cyber crisis. Read how to add function and lower the cost of video management for your enterprise and learn to better secure the perimeter of your business. Also, find out how hospitals are changing the security methods for visitors. Also in this issue, read about the latest news and events, as well as the latest innovations in the security industry.
The battle means that companies might be in danger of losing simply because they lack the manpower to deal with it. The battle means that companies looking for more security staff aren’t going to find them – they’re going to have to create them.
Being near family, surrounded by familiar and caring people, can help patients heal better and faster.
May 1, 2014
Badges are constructed to meet HIPAA, privacy and civil rights concerns – visitors’ last names are not included on badges, and generic room numbers are used as destination markers instead of departments (for example, badges declaring a destination of the “infectious disease” department).
That’s where mass notification systems come into play, as well, as is the case with MillerCoors’ Fort Worth, Texas, brewery, which is located in Tornado Alley and sees about 25 tornadoes each year. The brewery employs 105 employees spread across 150 acres, and it brews 9 million barrels a year. It houses an on-site refrigeration system with 150,000 pounds of ammonia to assist with the brewing process.
The museum’s exhibits guide visitors along an interactive walk that reveals the unique influences and challenges that shaped George Bush’s life and presidency. Visitors can explore and learn about the most important events of the 20th century, from World War II through the Persian Gulf War.
It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
May 1, 2014
The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.
There are a wide range of available metrics, meaningful standards, licenses and certifications, rigor, ongoing debates and controversies, critical thinking and creativity. Snake oil, product hype, misleading claims and charlatanism, while unavoidably present, tend to get weeded out fairly reliably. Committees, groupthink and linear/concrete thinkers don’t dominate the field.
By working together cohesively with HR and legal, the security team can also function as the final gatekeeper to help ensure that the organization is screening in accordance with its policies and that every candidate has properly cleared the company’s background check standards.
Hospital Emergency Departments are a truly unique environment.
May 1, 2014
Due to a number of complex issues which often include a lack of available dedicated psychiatric department beds, a growing population of persons with behavioral disorders and a decreased availability of treatment options due to budget reductions, boarding times of psychiatric or behavioral health patients has skyrocketed in recent years.
Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014
Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.
In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.
The most environmentally sustainable building in the world is the Change Initiative Building in Dubai, based on the LEED Commercial Interiors rating system.
May 1, 2014
At the recent ISC West Conference and Exposition in Las Vegas, sustainable security solutions were both everywhere and nowhere. As a judge for the Security Industry Association’s New Product Showcase at ISC West this year, I had the opportunity to participate on one of seven judging committees.
Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?
May 1, 2014
Regardless of how vigorously the industry applies risk management principles and how diligently the government shares information, there is no chance the private sector can consistently withstand intrusion attempts from foreign military units and intelligence services or even, for that matter, from transnational organized crime.
The latest buzzword these days is “Resiliency,” which for all intents and purposes is really nothing more than a new term for business continuity planning (BCP) in the private sector and continuity of operations planning (COP) in the public sector.
Probably the most important first step an organization should take in developing their BCP/COP program is to conduct an inventory of all of the enterprise’s processes, assets and resources (PAR). No one has the time or resources to boil the ocean, so once the inventory has been completed, the next step involves prioritizing the PAR list from the most critical to the least important.
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.