This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Furthering a vision to elevate security and safety services as a critical component of operational reliability, Gannett Fleming recently named William Foos, CPP, PSP, to the position of director of Security & Safety Services.
In retail, brick-and-mortar stores experience loss or shrink due to shoplifting, fraud, employee theft and human error. To mitigate against this, many have dedicated loss prevention (LP) personnel who use a variety of tools, including in-store video surveillance systems and point of sale (POS) systems, to deter and investigate theft. But, despite the continued best efforts of LP teams, shrink is on the rise.
Both turnstiles and doors are being integrated with advanced electronic access control, video surveillance and other intrusion sensors to provide enhanced security and cost-effective operational management options that help save on manned guard resources and offer real-time analytics. However, revolving doors and turnstiles are subject to special code requirements that are different than codes for swinging or sliding doors to ensure the safety of building occupants if emergency evacuation is necessary.
Here is a list of free resources, guides, frameworks, services and products to help enterprise security to navigate the coronavirus pandemic. If your organization is offering resources and products at no cost, please email henriquezm@bnpmedia.com to be included.
In spite of this cyber war and in an effort to be first to market, many companies still rush their products out while ignoring proper security integration during development which can lead to disastrous side effects for businesses. Costing them valuable data, reputation, money and time to amend their product weaknesses. Companies can spend a great deal of time and money developing security patches, repeatedly rolling back and implementing updates, and buying other technologies to secure their own offering. This cycle can potentially continue for years releasing cures to the latest aliments while fearing the next hit.
Looking back at cybercrime incidents of the past 10 years, only the questions of "if" and "when" remain. "If" a business has no active cybersecurity policy and processes even just hundreds of rich customer records, "when" becomes soon enough. For the past 10 years, at least eight large-scale data breaches per year have trembled economies. You’d imagine that as business owners, we would have learned the immense value of the digital data we hold. The Ponemon Institute says that just in the US, the average size of a data breach is 25,575 records with a cost of $150 per record on average. That could be the money you would have paid in damages, as a government fine, and potentially in customer lawsuits.
Ransomware has quickly emerged as a massive cybersecurity threat and is evolving continuously. Certainly, recent ransomware incidents should serve as a wake-up call for all businesses to remain vigilant against ransomware. To minimize the chances of being victimized by ransomware means going back in time to understand how ransomware developed and how it evolved.
Women face unique entry barriers in the security industry, discouraging many from pursuing careers in the industry in the first place. This trickledown effect, combined with a lack of recruiting and mentorship opportunities, means the security workforce is drastically lacking in gender diversity. When companies prioritize female leadership development and break the stigma, they create diversity of thought in the process, driving their own success.
Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.