It’s the evening rush hour and a smoke detector has been triggered on a busy rail platform. A security operator receives an on-screen sensor alert on his console.
There are three significant issues facing the online security industry in 2011. None of them are particularly new, but they are approaching crisis point.
The Water Valley ISD is a small, independent school district that is home to 350 students in grades K-12 in mid-west Texas. While crime and incidents are relatively few and far between, there are occasional occurrences of theft and trespassing and, like any school, Water Valley administration likes to keep an eye on things.
At the heart of customer relationship management (CRM) is the recognition that the customer is central to all business activities of the systems integrator, and that the success of the company is dependent on how well this is understood across all business operations.
“Three or four years ago, I got smart after I realized how much I don’t know,” says Larry Halpern, president of Safe Systems, Louisville, Colo. With 28 years of experience
Provisioning should blend the duties of human resources (HR) and IT and security departments. When asked where access and provisioning sits, most organizations say with IT, and if you’re looking
We live in a world where we begin and end each day awash in communications of all forms. From newspapers and television broadcasts to cell phones, computers and radios, our
The problem of counterfeiting – the sale of imitations or replicas of branded products, such as handbags and watches – is often proportional to a brand’s success. The more popular
According to ACFE research, organizations worldwide lose an average of 5 percent of their revenues each year to fraud. And criminals are using ever-increasing sophistication to pilfer their employers’ assets. Clearly, companies cannot afford to ignore indicators of fraud that may exist. With so much at stake, management must proactively look for fraud.
Although an all-out prohibition might seem to be the simplest way to deal with the security risks of social media, it is not necessarily the wisest approach. The technology does