Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Integrated Solutions

From gates, guns & guards to encryption, endpoints & erasure

Protecting intellectual property remains as important as ever in an increasingly digital world.

By Tom Aldrich, Trinity Davis
Circle of people on cell phones
March 8, 2024

Protecting intellectual property remains a concern for all organizations, even as new threats continue to emerge. Whether it’s a military unit establishing a base of operations in denied territory or a business undergoing a considerable liquidity event, the first order of protection is typically establishing “gates.” These walls and physical barriers help protect individuals and their teammates/employees in locations where they lay their heads at night.

Most businesses open to the public have Wi-Fi available for their guests. Sometimes it’s password protected, and sometimes users only need to be close enough to the router. It is shockingly easy to pick up a Wi-Fi signal from the road with a laptop and magnetized GPS puck, and then conduct a quick open-source search for the default admin username and password to a particular router. Despite how large the “gate” was, the internet signal provides individuals with a passive avenue into building, whereby access could be granted to browsing history, cloud storage, Apple ID or iTunes and more.

In the same manner that a private foundation can expose personally identifiable information (PII) via a Form-990 (vs embedded privacy features of a Donor Advised Fund), a lack of understanding of personal devices can leave people unintentionally exposed. This begs the question: what is the digital equivalent to “the gate”?


❝

Physical (and digital) walls are a great first step in the mission to protect assets. But if someone rams the gate — what’s the next line of defense?”


ENCRYPTION: THE KEY TO THE DIGITAL GATE

Think of encryption as a secret message hidden within a sheet full of jumbled letters, numbers and special characters. That message can only be deciphered by someone with the right key to unlock the data. Below are some considerations as it applies to everyday life that not only provide a digital wall around the compound, but also help keep an organization their reputation(s) safe.

  • Apple iPhone: Encrypt the photos, notes and iCloud Backups on any personal devices. Navigate to Settings and click on Name/Apple ID at the top of the screen. Scroll down and click on iCloud, then scroll down to (and click on) Advanced Data Protection. After updating all connected devices to the most recent software version, create a new, secure master password for the new encrypted backup. Don’t lose it!
  • Email & Private Messages: Seek out encrypted email and instant message providers
  • Password Managers: Look for password managers with end-to-end encryption, meaning they do not know or store master passwords.


GUARDING THE DIGITAL DOORSTEP: ENDPOINT PROTECTION FOR PERSONAL DEVICES

Physical (and digital) walls are a great first step in the mission to protect assets. However, if someone rams the gate — what’s the next line of defense? Insert endpoint protection. This is where the consistencypart of the equation makes the biggest difference. Embedding these best practices into monthly discussions will begin to build digital muscle memory that can (and should) last generations.

  • Multi-Factor Authentication (MFA): MFA is something a user knows (password), has (YubiKey, physical key) or something they are (fingerprint, iris scan). To help protect against accidental misplacement of company phones/iPads, or even physical intrusions like theft, MFA helps add a concentric layer of security around the most sensitive assets. Be wary of security questions being part of the MFA process; most of these questions can be guessed or gleaned from people search sites and open-source intelligence.
  • Malicious Link Filtering Software: Software programs can help protect against user error, like clicking on a malicious link or visiting a website that looks legitimate. Ensure that these programs can cover everything from browsing activity to SMS messages.
  • Software Updates: Most organizations wouldn’t ignore a leaking pipe in their building, especially when the risk of it bursting is high. This is the same concept with software updates. These patches are often rolled out for user protection. In addition to turning on automatic updates, ensure to power off devices once per day to ensure that the patch goes through.


DATA BROKERS AND GUARDING IDENTITY

One of the unfortunate realities of wearing a uniform, becoming an influencer, or having a large balance sheet is that privacy can easily (and quickly) become a luxury. Skill, fame and wealth can attract unwanted attention from many sources, including enemy forces, media, paparazzi and even stalkers.

Prior to obtaining fame or wealth, personal data is being bought and sold every day, often without users’ knowledge or consent. These companies, known as data brokers, create digital copies of users online. Such profiles include everything from home addresses, Social Security numbers and mobile numbers to tax IDs and registry numbers of legal entities (LLCs, C-Corps, LPs, foundations). How people transact and communicate becomes increasingly more important in the fight for privacy and the “right to erasure.”

Safeguard employee data by rejecting cookies, only providing as much information as is necessary, and (where applicable) opt-out of data sharing/selling. Encourage employees to do the same.

  • Email & Mobile: Utilize the Hide My Email function for Apple users or test out apps like Cloaked, which provide a unique email, phone number and password for each identity created.
  • Social Media Settings: Check the visibility settings on LinkedIn. Navigate to Settings & Privacy, Visibility and then Edit Your Public Profile to determine who has access to profile photos, headlines, summaries and more.
  • PII Deletion / Opt-Out Services: For privacy fundamentalists, begin research on the data broker industry and explore ways to either opt-out or delete exposed data.

Data privacy rules, regulations and their complexities are constantly shifting in this interconnected world. Organizations would be best served to heed these reminders and take action towards shielding themselves during a time of increased threat actor activity — which is showing no signs of slowing down. That said, these simple tips can go a long way towards ensuring future safety online for all.

KEYWORDS: employee morale insider threats risk management workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tomaldrich

Tom Aldrich is VP, Private Clients at 360 Privacy. 

Trinitydavis

Trinity Davis is SVP of Strategic Business Development at 360 Privacy. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guards, Guns, Gates and Google

    See More
  • 2012 Security Leadership Issue: The Security Leader: Beyond Guns, Guards and Gates

    See More
  • security guard standing by doors

    From human to hybrid: Why augmented guards are the future of security

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing