Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.
Security directors are no stranger to the necessity of blending legacy physical security devices and software with newer products and services. Whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to leverage new access control card reader technology with existing hardware without installing completely new door controllers, card readers and wiring, retrofits are a large percentage of installations, encompassing many of our industry’s technologies.
To provide a more secure environment, security directors must transition from controlling access to doors and buildings to managing the identities that walk through those doors.
A proposed bill in the New York State Senate would mean that anyone wanting to buy a gun or renew their gun permit will be subject to a review of their internet history and social media accounts.
Acting Attorney General Matthew Whitaker announced awards of more than $56 million in grant funding awarded last month through the Department of Justice’s Office of Justice Programs (OJP) to enhance state, local, and tribal law enforcement safety and wellness.
Organized retail crime is continuing to grow, with nearly three-quarters of retailers surveyed reporting an increase in the past year, according to the 14th annual ORC study by the National Retail Federation.
The frequency with which Americans worry about becoming the victim of a variety of different crimes is similar to last year, as they remain much more likely to fear being victimized by cybercrimes than traditional crimes.
Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019.