Nearly one in six American organizations suffered from fraud in the last two years, according to the 13th Global Fraud Survey from EY – nearly double the rate measured in 2012. While mitigating external risks is all well and good, ensure that you look inside your enterprise as well – all the way to the cubicle.
News of massive hacking attacks that expose sensitive company data and compromise customer account information has businesses of all sizes taking a closer look at their data security practices.
Rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint protections and network perimeter security.
It will come as no surprise that international travel poses a rapidly expanding number of risks for travelers. For women, the risks are magnified, especially in certain regions of the world. High-profile attacks on women in a number of countries reflect a general state of danger for female travelers.
Ok, everyone has heard about The Internet of Things (IoT) and Big Data. So, that on its own is not much of a prediction. But this prediction is about IoT and you.
Aside from dialing 9-1-1 during an emergency, most people are not familiar with how emergency dispatch works. This often also holds true for facility security personnel. Whether a gas leak or armed employee, it is important that enterprise security personnel understand some of the technology and process behind our national emergency number and response system for their own professional purposes. With this in mind, the following should be considered.
There are good ways to handle your contract security officers and bad ways. We break it down here. For CSOs and other purchasers of security services, you first need to define needs and roles.