Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Counterfeiting in a Bad Economy: The Threats Remain but the Targets Change

Adam Scheer
November 8, 2011
While counterfeiting may not be the “world’s oldest profession,” given its ancient roots and its ubiquity across geographic and cultural boundaries (counterfeit coins were as common in Roman times as Canal Street knock-offs are today), it clearly deserves a place as one of the humanity’s most persistent paths in pursuit of illicit profits. But just because counterfeiting is enduring does not mean that it is unchanging; many of the same macroeconomic drivers, fashion trends and new technologies that inform our preferences at the shopping mall also drive the behavior of the astute counterfeiter. So as the newspaper headlines continue tell us that bad economic times may stay with us for a while, it is worth considering how a challenging economic environment can impact the behavior of the counterfeiter and what brand owners can and should do to fight this threat.
Read More
Security key pad

10 Typical Door Opening Issues

Matthew Conrad
November 8, 2011
Failure to maintain an egress as well as failing to protect people from smoke and fire are all too common, yet easy to discern. Better yet, all are preventable through improved staff performance or implementing affordable solutions. Here is a list of ten typical life safety violations along with solutions that can help keep facilities safer for visitors and staff.
Read More
Advancing Security and Well Being Through Localized Efforts

How to More Efficiently and Cost-Effectively Streamline the Programs within FEMA

Joe Wilson
October 25, 2011
The U.S. House of Representatives Subcommittee on Economic Development, Public Buildings, and Emergency Management recently held a hearing in response to newly introduced federal legislation (H.R. 2903 and H.R. 2904). This legislation would set the stage for congress to reauthorize the Federal Emergency Management Agency (FEMA) and two of its expiring programs, while establishing a clear framework for the modernization of its public alerts and warning systems.
Read More

Will the Real CSO Please Stand Up?

Eric Smith
October 25, 2011
Many large organizations are beginning to add the position of chief security officer (CSO) to the C-suite. This is great news as it highlights the benefits and importance of a well-designed security unit as a business function. However, some recent trends suggest that some organizations still may misunderstand the impact and role of security.
Read More

Medical Facilities Protect Against Unauthorized Access

October 19, 2011
There are numerous areas to secure in today’s medical facilities. Outside doors, of course, must offer protection against unauthorized access by patients, visitors, employees and outsiders. Similarly, doors to wards, rooms and offices must be safeguarded. But that is only the beginning of the story. There is also a growing need to restrict access to medicine storage cabinets, medicine carts, computers, medical records systems, ambulances and even parking lots.
Read More

Advancing the University of Colorado Hospital’s Security Program

October 18, 2011
The University of Colorado Hospital, located east of Denver in Aurora, CO, is one of the leading hospitals in the nation. In 2011, UCH was ranked as the best hospital in the Denver metropolitan area and in the top 10 nationally for Best Medical Schools: Primary Care by US News and World Report.
Read More

Educating Your Employees Before They Go Abroad

Tips for International Business Travelers
John Rose
October 11, 2011
With threats of terrorism, political chaos, riots, kidnappings, and growing street crime, today’s international business travelers need to be aware of their surroundings and keep their guard up at all times to maintain personal safety. Navigating even the safest and most developed regions of the world, or those perceived to be, has become more challenging than ever. From Europe to Asia and even in our own back yard, events that can easily put an unsuspecting or unprepared business traveler in harm’s way. As a security officer or manager for your company, you worry about the safety of your business travelers. However, following a few basic tips will help both you and those traveling feel more comfortable and prepared, wherever business may take them.
Read More

The 5 Top Ways to Carry Out a Successful Breach Notification

October 11, 2011
The process of notifying affected populations in the event of a data breach is complex and littered with potential land mines – handled poorly, the notification can be a black eye for an organization and potentially open them up to regulatory fines or sanctions. Brian Lapidus and his team at Kroll have assembled the following advice for businesses to help them minimize their risk and simplify what has become a very challenging process.
Read More

Are Your Vacant Buildings Adequately Protected?

Key Risk Management Considerations
October 11, 2011

 

Economic downturns typically result in an influx of foreclosed, vacant, idle, and even completely abandoned properties. This affects a range of business sectors—including habitation and office facilities, factories, schools, hospitals and retail.


Read More

Meeting the TCO Challenge for Video Surveillance Systems

Karen Krivaa
September 27, 2011
“Do more with less.” That’s pretty much the message security managers and IT directors hear these days. On the one hand, security now ranks high on the agenda of most organizations; on the other, shrinking budgets pose a real challenge to deploying the security and surveillance systems they need. Fortunately, when you take a deeper and longer-term look at the economics of surveillance systems, a different picture can emerge — one that makes a lot more sense from a financial point of view.
Read More
Previous 1 2 … 260 261 262 263 264 265 266 267 268 … 275 276 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing