The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Human resources departments (HR) handing out information sheets is not going to curb the spread of the Coronavirus (COVID-19). Training has to be conducted in concert and in person to all by the security department, as, it is a security threat. Here are some protocols and policy management procedures your enterprise and security department should consider to mitigate the spread of Coronavirus.
A key role in corporate security leadership is in understanding global vulnerabilities as part of a shift that goes beyond traditional security concerns, in order to anticipate new risks to your organization.
A few months ago, ISIO suggested in articles that security managers must ensure that there is a contingency in the budget to obtain equipment or skills training in case of an unknown threat that could arrive out of the blue. Any responsible managing or finance director must consider allocating funding and preparing for this emerging threat because it has life impacting or life and death possibilities.
Twenty-three years ago, when I worked with the Federal Protective Service policing federal facilities where security contract oversight was key, the General Services Administration and U.S. Justice Department designed systems that complimented each other to provide concentric layers of protection against unlawful entry and other threats.
Let’s put this into perspective. In 2019, the Centre for Disease Control reports that 61,200 people died from the common flu virus. That’s 168 deaths per day! Compared to Coronavirus that was first reported on December 31st with 213 deaths in total until January 31st. Based on last years statistics, 5,208 people have died of the common flu in that same time period.
Breakthroughs and advancements in security emerge every day, and there is no better time than now to start being careful with the security information we share with others.
Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT.
The word ‘integrity’ comes from the Latin ‘integer,’ meaning complete, or whole (the same source as the mathematical term for a whole number). A person with integrity, then, is someone who has a fully developed moral character.