The Partner Alliance for Safer Schools (PASS) members have been developing a school security assessment tool and a set of school security guidelines to be revealed at ISC West this month. The living document will provide specific recommendations (especially regarding the use of electronic security equipment) divided into “layers” (parking lots, main entrances, classrooms, etc.) and then again into tiers (depending on the level of resources a given school has available).
One in three U.S. hospitals reported an increase in violence and assaults in 2014 despite widespread rising security budgets, according to a survey of 380 hospital administrators, chief security officers and staff by Guardian 8 Corporation.
Hospitals, assisted living centers, nursing homes and other healthcare providers are under constant pressure to keep their facilities safe while managing costs. In addition, they need to manage constant visitor traffic, open access in multiple buildings, hectic emergency departments, confidentiality requirements, governmental standards and patient satisfaction surveys. To effectively deal with all these issues, more and more healthcare institutions are opting to outsource their physical security services.
As enterprise security executives, we are largely trained to focus our security plans toward a Design Basis Threat (DBT) – the most likely or credible threat(s) to a site, weighted by probability and impact of successful attack. Primarily this focus is aimed towards three common categories: Insiders, Outsiders and Outsiders with Connections to Insiders.
While security departmentsare more concerned with disruptions to patient care and C-level executives are focused on hospital administrations’ understanding of Centers for Medicare & Medicaid Services (CMS) regulations, but hospital security decision-makers are focused on patients’ and officers’ safety overall.
Want happy employees? It’s more than the occasional catered office lunch. It’s providing an environment where employees can be productive, collaborate with colleagues and find creative ways to power through their to-do lists. Mobile devices play a primary role in this movement, but so have the widespread adoption of public and private cloud applications, which have provided workers access to their files, and each other, anywhere, anytime and from any device.
This month, Security magazine brings you the 2020 Guarding Report - a look at the ebbs and flows security officers and guarding companies have weathered in 2020, including protests, riots, the election, a pandemic and much more. Industry experts discuss access management and security challenges during COVID-19, GSOC complacency, the cybersecurity gap, end-of-year security career reflections and more!