Healthcare businesses are already reeling from massive losses during the pandemic, and cyberattacks could cause further long-term damage beyond the initial attack. Research at Morphisec indicates that almost 3-in-10 consumers say they would consider switching providers if their records were breached in a cyberattack. Considering that same report found that 1-in-5 Americans say a cyberattack has impacted their healthcare provider in the past year, it’s undoubtedly worrying news for the entire industry. With this in mind, here are three avenues hackers are likely to exploit as healthcare becomes a more attractive target and what providers’ need to do to protect their sensitive data and safeguard the lives of their patients.
The social and economic impacts of political violence don’t often match. Terror attacks can accomplish their main objective of striking fear into a local population while not significantly interfering with commerce, and broad waves of unrest have the potential for supply chain disruption, local business closures lasting for days, and repair and remediation that can become quite costly. There’s a third category that doesn’t get enough attention in policy and academic circles: insurance industry losses.
The two most common methods of security guard communications in use today are cell phones and two-way radios. Security managers can have difficulty in deciding which system is best used on a particular job site. Should they use two-way radios, cell phones or both?
A recent survey conducted by Rave showed that only 22% of respondents completely trust the information they receive from local officials. Many factors – such as the spread of disinformation, social unrest and the ongoing pandemic – likely contribute to this low level of trust. However, it still poses a big problem to local leaders who are trying to keep residents safe – especially during the ongoing pandemic. We connected with Todd Miller, SVP of Strategic Programs at Rave Mobile Safety, to talk about how local governments and organizations can go about re-building trust in their communities by communicating effectively with residents.
Establishing operational resilience in the face of cyberattacks has become a top priority for organizations. As a core component of the IT infrastructure, Active Directory (AD) must be at the center of that process. But who is responsible for ensuring Active Directory is both protected and can be recovered quickly when a cyberattack occurs? In many organizations the answer is not clear, which can lead to missteps in detecting, defending against, and responding to cyberattacks.
As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.
As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.
While many people around the country were under stay-at-home orders, many security professionals, classified by the federal government as essential personnel, have continued to report to work during the pandemic. The heart and soul of the physical security business are the nation’s contract security professionals who assume leadership roles – sometimes with lifesaving ramifications – at facilities across country. Security professionals act as the first line of defense against civil unrest, violence, terrorist attacks and the pandemic.
Just like about everything else in the world, the loss prevention/asset protection space has been hugely affected by the pandemic and the “traditional” threat landscape for security professionals in this area has evolved over the past year and half. Let’s take a look at pain points, best practices and COVID-19’s impact on loss prevention.
With enterprise security risk management, organizations should consider the risks versus potential impact to dictate when and how often they assess risk. What does that mean for your organization?
Enterprise security risk management is an approach where organizations should consider the risks versus potential impact in order to dictate when and how often they assess risk. The ESRM approach to risk management and security is meant to keep a security program agile and responsive. Learn about the keys needed to implement an efficient ESRM program.