While 86 percent of C-Suite executives are aware of the legal requirements supporting the protection of confidential data, one in five have never performed a security audit
September 1, 2014
The study also found that almost half of the small business owners surveyed conduct no regular audits of their security protocols, and three in 10 have never performed an audit.
Licensing may not be as exciting as a game of high-stakes poker, but how you play your security and access control licensing cards can significantly affect the bottom line.
Using cameras can provide a viable alternative, when combined with analytics, to bypass other infrastructure-heavy tools, such as adding fiberoptic cable to perimeter fencing to detect intruders or trenching for driveway sensors or barricades, giving Taminco and the security system an overall smaller footprint.
The common identification standard for all federal employees and contractors is the Personal Identity Verification (PIV) smart card, defined by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) 201.
Establishing and maintaining a culture across the enterprise that is based on unwavering ethical practices from the boardroom to the lowest level employee is also a key element of effective governance programs.
One of the most important topics currently on boardroom agendas focuses on governance. Ensuring that the enterprise understands and complies with laws, regulations, policies and procedures is no longer simply enough.
Do your healthcare employees text? Careful – this could be a serious HIPAA compliance problem. According to SearchHealthIT, nurses and physicians are likely already using the unsecure text-messaging apps that come with their personal smartphones to communicate at a quicker pace.
Many security professionals have had some experience with Tour Compliance systems, often comprised of pipes and buttons and used to simply monitor that a security officer’s “rounds” or tours are completed as scheduled.
The hiring process overseas can be a much taller hurdle than anticipated – How can enterprise security executives vet candidates effectively?
August 1, 2013
Background checks are a normal course of the hiring process for many companies in the United States. In some industries – like financial services and education – this due diligence is actually mandated by government regulations.