If you are a landlord who owns rental property in a different state (or a significant distance away) and you are relying upon traditional locks to manage access to your property, this article will show you a better, more secure, time-saving and money-saving property security system.
The FBI recently released its data on the Active Shooter Incidents in the US for 2018. Although there was a slight drop in active shooter events to 27 from the high of 30 in 2017, this is still no cause for celebration.
When is the last time your facility was subjected to an electrical power surge? Chances are, you have no idea – for two very good reasons. First, power surges are typically very brief – lasting only a few milliseconds. Secondly, most power surges are relatively small and go unnoticed, unless they are significant enough to make the lights flicker. Even so, they remain dangerous to your systems and should not be ignored – they are a silent killer of your critical electronic equipment.
Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
Imagine losing your car keys. It would be inconvenient, as you could be stranded for a while and you would need to find and obtain a replacement key. Now imagine losing a set of work keys. How much disruption could this cause your company? Remember the 2014 Sony breach? It was perpetrated by a group who claimed that they were able to access the movie studio's computer systems because Sony failed to lock their physical doors.
We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams.
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.