Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.
Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.
One of the biggest threats to wireless security devices is radio jamming, which occurs when a malicious actor illegally purchases a radio frequency jammer tool and uses it to block alarm devices’ connections to their affiliated security company. If alarms can’t properly communicate through their network—which is typically cellular—then they cannot notify security providers when there’s a crisis.
A combination of factors are likely to keep the world on this path in the near term regarding social unrest. An atmosphere of social unrest has potential consequences at the enterprise level in terms of risk and resiliency and business continuity. Here are five concrete steps security leaders can take to prepare for or reevaluate their existing response plans.
Multiple Interactive Learning Objectives (MILO) — recently implemented by Michigan Medicine Security — provides realistic, life-sized scenario training. The learner is surrounded by screens upon which scenarios are projected. The scenario library includes a disruptive visitor at the nurse’s station, a breakroom argument that escalates to an unsafe level, a person experiencing a mental health crisis and many others.
As part of an effort to help users apply its well-known Cybersecurity Framework (CSF) as broadly and effectively as possible, the National Institute of Standards and Technology (NIST) has released finalized cybersecurity guidance for positioning, navigation and timing (PNT) services.
Indian Head Park Village in Illinois has security cameras as a top priority for the 2021/2022 fiscal year to boost security, safety and help solve crimes.
Check out the latest innovative technology and products designed to reduce risk, tighten COVID-19 pandemic response, and enhance the value of safety and security within various sectors.
Check out the latest innovative technology and products designed to reduce risk, tighten COVID-19 pandemic response, and enhance the value of safety and security within various sectors.
Fraudsters are taking advantage of the pandemic and increasing the threat landscape for governments and enterprises around the world in a wide-reaching fashion.
Fraudsters are taking advantage of the pandemic and increasing the threat landscape for governments and enterprises around the world. Where are the threats coming from and can security leaders expect to see an elevated threat landscape into the future?
My experience in the public safety sector has taught me that the only thing you can expect every day on the job is the unexpected. From civil unrest to natural disasters, unexpected events occur daily with little or no warning. When unforeseen or unpredictable emergencies occur, security departments are often called upon to help mitigate the situation. This can cause a sudden and massive surge in demand for additional manpower. So how can a security operation rapidly fulfill excessive labor requirements while synchronously managing the crisis at hand?
Arkose Labs released new data on the latest fraud trends that reveal a massive spike in fraud across all industries from Black Friday onwards. As consumers continue to flock online in droves greater than ever before, credential stuffing, account takeover (ATO) attacks and gift card fraud are poised to be top attack vectors in 2021.