The Wall Street Journal recently stated that commercial burglaries have almost doubled in New York City since March 12 when a state of emergency was declared. Reason being, thieves are targeting nonessential businesses that have shuttered locations as a result of government directives or are robbing essential businesses that would likely have more cash on hand. Multiple retail organizations are also reporting an increase in shoplifting attempts and point of sale shrink since the beginning of the coronavirus outbreak. In times like these, as a rise in theft, burglaries and other disturbances are expected, security is more important than ever.
Hospitals are where people go to seek treatment, recover, and address critical injuries. It is the place where doctors, nurses, and other healthcare providers devote themselves to helping people who need medical attention. In addition to this critical focus, a hospital also has to protect against unauthorized access, theft of medications or sensitive patient information, and guard against workplace violence, which affects hospitals more than other industries. At the same time, they must maintain a level of accessibility and openness, which presents difficulties as it relates to security.
Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.
Convincing C-suite executives to approve budgets for security system upgrades may be difficult in the best of times. However, the COVID-19 pandemic and resulting financial upheaval it caused may make selling new projects more challenging for security directors. While security may not be a daily topic of discussion among C-suite members, they understand the need to provide and maintain a safe and secure environment for corporate employees and visitors. But they don’t see security in terms of a camera brand or access card technology. They view security in terms of risk management and mitigation strategies. Addressing those concerns in any project plan will increase its chances of it winning approval.
The Internet of Things (IoT) continues to be a driving force behind smart buildings, with the ability to optimize all areas of building operations – from HVAC to surveillance, offering massive potential for facility owners and system integrators to create added value for customers. While goals such as reducing energy consumption and space utilization are still priorities, building owners and operators are searching for solutions to help make workspaces and common areas safe and useable, abiding by new health and safety guidelines. Security professionals are also searching for ways to leverage and augment their technology infrastructure to contribute to the overall safety of their facility, beyond the traditional capabilities of access control and surveillance.
On May 26, the District Court found in the In Re: Capital One Consumer Data Security Breach Litigation that a report prepared by Mandiant concerning the Capital One data breach (Breach Report) was not protected by the work product privilege and must be turned over to Plaintiffs. What are some lessons to be learned from this data breach litigation response?
It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations are forced to look externally for the experience they require. However, looking for outside hires also contributes to the shortage of potential internal leaders, as skilled professionals are often overlooked. For the security industry to thrive, this needs to change, and it starts with grooming the next generation of leaders.
According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.
This month in Security magazine, we examine how physical security leaders are being propelled into a unique position of revenue preservers and risk managers for their businesses. In addition, we profile Scott Ashworth, Director of Security for Atlanta United. Also, security leaders discuss how to develop cybersecurity careers, election security, data protection strategies, measuring and reporting security operations maturity and more!