The Association of Certified Fraud Examiner’s (ACFE) 2010 Report to the Nations on Occupational Fraud and Abusecompiled 1,843 cases of occupational fraud worldwide between January 2008 and December 2009. The survey estimated that a typical organization lost 5 percent of its annual revenue to fraud with a median loss of $160,000; nearly one-quarter of the frauds involved losses of at least $1 million.
Pastor Darryn Scheske welcomes most everyone to his Heartland Church in Indianapolis, everyone except troublemakers. So working with a parishioner, the Church mixed tried and true with newer access technologies to make the campus safe and secure as well as caring.
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
This September will mark the 10th anniversary of 9/11 and some security pros fear that the worst could be yet to come. “Our view is that the goal of terrorists is to beat the devastation they caused on September 11, 2001, and one way to do that is to go after our children,” says Alan J. Robinson, director, Protection and Security Services/CSO, Atlantic Health, Morristown, NJ. “Topping the events of 9/11 is difficult to replicate; unfortunately, in order to exceed or even match the shock and awe of 9/11, terrorists must target a population so vulnerable it restores their reputation as a terrorist organization.”
Create an access management system that is tailored to the exact requirements of each area of your operation, whether on or off site…from protecting parking meter cash to auditing collection routes to controlling traffic to your buildings.
Sony’s PlayStation Network is reported to have 70 million registered users worldwide. On May 2, 2011, Sony issued a statement that 12,700 credit cards and 24.6 million user accounts were compromised. The stolen data included names, addresses, dates of birth, passwords, security questions and answers and credit card information. This compromise is said to be one of the largest and most high-profile online data thefts to date.
The University of Arizona, like major research universities across the country, found that many of its grants and contracts were tied to higher levels of access security. Access to buildings with old-fashioned keys and locks or cards with magnetic strips swiped into pin pads didn’t provide the amount of security the University was looking for. So the school made the switch to smart cards.
Do you think that keys and locks are the oldest man-made security tool? Forget it. Guardhouses go back hundreds, if not thousands of years as a place a person would sit or stand, observe, control access, alert others and take occasional action such as dumping hot oil over the wall. These permanent and temporary structures, built in or brought in, are used in most every country.
In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.