Videoconferencing has been around for a surprisingly long time. In fact, the first call involving both audio and video links has been traced all the way back to 1927 in a call that took place between officials in Washington, DC and the president of AT&T in New York. Although it was laughably primitive by current standards, electronic conferencing technology has never stopped growing in either refinement or use.
It comes as no surprise that the number of deaths attributed to gun violence in 2020 far surpassed years prior and the trend is now continuing into 2021. Gun violence has been weighing heavily on law enforcement officials, especially after the recent riots and presidential inauguration threats. Organizations, institutions, government agencies, and public venues have the responsibility to take a more proactive approach in protecting their people. Now is the time for serious conversations around upgrading and modernizing security technologies.
Video conferencing platforms have become an essential communication tool over the past year. In addition to increasing team collaboration, video conferencing can help prevent miscommunication among teams, increase engagement, and allow for face-to-face communication to help build relationships among teams, particularly for remote teams. Though the benefits are many, there are growing concerns about the security shortcomings of video conferencing, according to George Waller, EVP and Co-Founder of StrikeForce Technologies. To get more insight on this topic, we spoke to Waller about key challenges with securing video conferencing platforms, as well as why these services are so susceptible to hacking.
On Thursday, March 25, 2021, the Innovation Institute for Fan Experience (IIFX) will host a one-day virtual summit themed “Prepping for the Return of Fans!” Key areas covered will be health, safety, security, operations and management.
You can’t effectively create a risk program if you don’t have a full picture of just how large the risks are for your organization. “You can’t secure what you can’t see” so to speak. Risks don’t necessarily arise from lack of technology – oftentimes they are hidden in faulty business practices. We are well beyond the days of IT and security being segmented off in their own little world away from the business.
Although small businesses may not have the financial resources of larger enterprises, they do possess a trove of business and customer information that can net attackers a tidy profit either via ransomware or sale on the dark web. Understanding today’s threats—and how to defend against them—has grown increasingly critical for small businesses. Here are a few of the most common attack vectors that they should be prepared to face.
The Security Benchmark Report (formerly the Security 500) survey is now open! Calling all enterprise security leaders within your organization...fill out the survey today and help us benchmark where security lies within every sector and industry.
The recent attack on SolarWind's Orion product demonstrated how vital it is for Chief Information Security Officers (CISOs) and their teams manage supply chain risks and understand all the products in their environment and how they are being used. Here we talk to Michael Lines, CISO and Head of Security Product Management at Cleanshelf, about why the IT and information security community should be concerned after the SolarWinds hack.