Of the 15 percent of workers who changed or lost their jobs in the past year, half took confidential company data with them – and 52 percent didn’t view the use of such documents as a crime. A lack of security can impact an organization’s growth and innovation, making it more difficult to meet workforce and customer needs.
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
BetterCloud released its first insider threats report: “State of Insider Threats in the Digital Workplace 2019.” The report found that 91 percent of IT and security professionals surveyed feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more.
Many physical security infrastructures were developed and implemented without considering cybersecurity for our IoT driven world. Network and communication protocols for remote control and management had assumed closed, non-public networks. However, these systems evolved to be highly interconnected systems with open, public networks.
What is the cloud’s role in commercial physical security? If you are in charge of security for your company, here’s what you need to know to ensure you use the latest technology to prevent physical security breaches.
A podcast exploring the processes and payoffs of transitioning to a cloud-based physical security solution.
March 19, 2019
Listen to this podcast featuring David Stratton, Security Manager of a well-known national distributor of automotive products with 150+ locations, as we explore the processes and payoffs of the transition to a cloud-based physical security solution.
Organizations are doing some fancy footwork with security these days in order to simultaneously protect users yet empower them to perform various tasks online. As application workloads and activities move to one or more cloud environments, organizations have also begun to ask what they should do to ensure proper cloud security.
Our June issue cover article features “Security Leadership: Women in the Spotlight”.
Also in June, video is becoming a fundamental component of a quality security plan. How can CPTED strategies lead to better physical enterprise security? And discover How David Espie, Director of Security, secures Mayland's Seaports.