According to “Joint Commission Perspectives,” a 2009 survey revealed that the most common types of Joint Commission standards citations given to hospitals were for Life Safety Code violations. In fact, Life Safety Code-related violations were the first, second, fourth and sixth most frequently cited, includinf failure to maintain an egress as well as failing to to protect people from smoke and fire (source: Joint Commission Perspectives). These findings are likely in part to be the result of The Joint Commissions’ increased focus in this area and the addition of Life Safety specialists to the inspection team.
The deadliest active shooter incident by a single suspect was the recent murders in Norway, where one gunman shot dozens of students, trapped on an island with him, after setting off a bomb in the capital.
The number of tablet owners continues to soar, making it difficult for manufacturers to keep up with demand. New tablet owners are increasingly business users, particularly within industries such as retail, banking, and healthcare. Estimates indicate that 25 percent of tablet sales in 2011 will be made by enterprises, leading some to call 2011 the year of the enterprise tablet. All estimations aside, a tablet’s ability to provide mobility and flexibility is irrefutable, and businesses are noticing. But can tablets be deployed in an enterprise without sacrificing security?
Security breaches can cost organizations millions of dollars, and those costs could be followed by lawsuits, insurance claims, and hefty fines. Just as important are the devastating effects on company reputation and customer trust that could extend far into the future. A 2008 study by the Ponemon Institute, which researches information security policy and data protection, found that after a breach of credit card data businesses lose 31% of their customers.
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
Today, security is of utmost importance at the nation’s colleges and universities. Events such as the Virginia Tech shooting in 2007 remind administrators, parents and students of the stark reality that considering the safety of all individuals who visit, work or attend classes at college campuses is essential.
Outside of the classrooms and general sessions, the ASIS 2011 exhibit floor will be abuzz with activity around some of the most innovative security products and services the industry has to offer. The challenge for many will be in navigating the more than 700 exhibits across 230,000+ square feet to find the best solutions.
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
There are a number of aspects of 'conventional wisdom' in the realm of physical security that just don't add up, that smack of having their origins in "the salesman made me do it," which under close scrutiny turn out to be absolutely backwards or even dangerous.