Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?
There are several options to consider when it comes to analytics for video surveillance systems: deploy analytics on the edge, or “in-camera”; use a dedicated server; or use a hybrid approach which leverages both edge and server implementations.
With the rapid growth of business travelers, especially millennial business travelers, companies often find it difficult to manage travel safety, health and security of their employees. This rapid growth also brings changes to the diverse composition of a mobile workforce and the risks associated with it. As the modern workforce continues to grow, there is no one-size-fits all approach to answering questions surrounding workplace law and lesbian, gay, bisexual, transgender and queer or questioning (LGBTQ) employees.
You can’t simply learn resiliency; there isn’t a book or set of checkmarks you can apply to a list that means you are resilient. Instead, it’s real-world training like War Gaming that delivers the closest “I’ve been there” experience and creates the muscle memory needed to respond effectively when an incident – and all the fear, confusion and paralysis it can bring – occurs.
A focus on the basic elementary principles of cybersecurity can go a long way in protecting your company from most attacks. Penetration testers are the frontline witnesses on cyber threats. They continue to see the same weaknesses and vulnerabilities within the enterprises they examine. Below, is a list of recommendations for you to be aware of in the year ahead.
During the past decade, many corporate security divisions have made tremendous strides to evolve as a key component of their company's organizational strategy and growth. Whether a company's security program is in-house, outsourced or a hybrid of both, the leading global security executives and decision-makers are acutely aware of how to effectively leverage the resource capabilities of intelligence professionals within their organization.
The challenges of keeping inappropriate people out of a K-12 school have led many campus administrators to rethink how they control building entries. Unwanted visitors ranging from a non-custodial parent to an active shooter have too often entered a school through an easily accessible door. However, there are steps security experts agree can prevent – or at least delay – entry, making both students and teachers safer.
How Hendricks Regional Health's Security Team Went from 99% Paper to 95% Paperless
January 25, 2019
When Steven Wagner joined Indiana-based Hendricks Regional Health, the department was run on 99-percent paper, with no electronic method of tracking security officers’ activity or sharing information across shifts except for a sporadically updated blog without a search function.