This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » COVID-19

Items Tagged with 'COVID-19'

ARTICLES

The security risks surrounding COVID-19 vaccine distribution

COVID-19 vaccine security: an assessment of the risks, both physical and cyber

February 26, 2021

In a report titled, “COVID-19 Vaccine Security Assessment,” analysts at G4S detail the security threats – both physical and cyber – associated with vaccine distribution across the U.S. and around the globe.


Read More
scam alert

Don’t let IVR fraudsters exploit COVID

Matt Garland
February 26, 2021

Contact center call volumes will vary from industry to industry and from month to month, but the general trend is steeply upward.  Adding new agents isn’t the only or even the most efficient way that contact center managers can respond to the great COVID crunch of 2021. A properly deployed Interactive Voice Response system can make workloads manageable for agents while keeping customers from long and frustrating minutes on hold. Still, new options for callers may correspond to new opportunities for attackers. 


Read More
cloud-enews

Why security must be shifted left in a cloud-first strategy

Dustin Milberg
February 24, 2021
Companies with cloud-first strategies are growing in number as the benefits of cloud have become more apparent and appetizing in the fallout of the COVID-19 pandemic. However, simply having a cloud-first strategy doesn’t guarantee success in the cloud, cost savings and increased agility. Similarly, security remains a pervasive threat if a process for mitigation is not built into the very foundation of your cloud strategy.
Read More
vaccine covid

Cyber resilience: Protecting the vaccine supply chain

Kevin Brown
February 24, 2021
As pharmaceutical companies and healthcare organizations turn their attention from the development to the deployment of coronavirus vaccines, well-resourced cybercriminals are hotly following suit. The vaccine supply chain is rife with logistical complexities making the enormously valuable data on the various vaccines deeply attractive to threat actors. In fact, cybercriminals are already attempting to steal vaccine formulas and disrupt operations.
Read More
artificial intelligence

AI and IoT continue to increase interoperability demands in 2021

Per Björkdahl
February 23, 2021

Technologies such as occupancy management, automated visitor management and touchless access control applications are increasing in demand – turning up the dial on interoperability as organizations seek to deploy best of breed solutions. To power these technologies, Artificial Intelligence (AI), cloud storage and the Internet of Things (IoT) are driving new functionalities and new uses from existing technologies to deliver customized applications for pandemic related health, safety and security issues. While this year might bring a number of uncertainties, we remain confident that the industry will continue to see growth and demand for these trends.


Read More
Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

February 23, 2021

Potawatomi Hotel & Casino, a 500-room luxury hotel located in Milwaukee, has implemented a touchless security screening for guests that includes temperature screening and weapons detection screening without needing guests to walk through individually as is the case with traditional screening methods.


Read More
active assailant attack

Are businesses prepared for an active shooter?

Patrick V. Fiel
February 23, 2021

Mass shootings in the U.S. have increased despite  widespread closures of schools, businesses, and many public places due to the coronavirus pandemic. There were 615 mass shootings in 2020 resulting in 521 deaths and 2,541 injuries. Compared to the previous year, there were 181 more incidents. The stress of the COVID-19 pandemic, job loses, unemployment, and the economic crisis is a potential for a disaster which could lead to an increase of violence at the workplace. The recent spike in gun incidences and stolen weapons across the United States is alarming. Businesses need to take heed and increase security measures to protect their employees and staff.


Read More
cameras surveillance

Cloud-based solutions playing crucial role in current and future of commercial security space

Kim hartman
Kim Hartman
February 19, 2021
An example of how businesses are benefitting from integrated cloud-based systems would be in the retail industry. Retail end users have integrated their security camera network, heat-mapping and video analytics technology with a cloud-based system so they can remotely monitor who is in their store. The heat-mapping and analytics technology also showcases where customers are spending the most time in their store, providing retailers with insight as to where they can place specific item displays or promotional items. This information can also be used to inform on if a specific location in a store needs additional signage to encourage social distancing, or even if it needs increased camera coverage within a store. The practical applications of integrated cloud-based systems and other security technology are nearly endless.
Read More
COVID-19 app response for K-12

California Charter Schools roll out blockchain protection measures for COVID-19 response

February 18, 2021

Public California Charter Schools are taking steps to reduce COVID-19 risks by mobile application that will provide analytics to the schools for proper COVID-19 response.


Read More
virtual meeting

What does your virtual meeting background say about you?

Tl jennifer bazela detail
Jennifer Bazela
February 17, 2021

Virtual platforms are a great tool to bring people together. And at least initially, virtual backgrounds were fun. Many of us used virtual backgrounds to redecorate our homes, try out new styles and show off some of our personal interests. But the trend now seems to be shifting. My experience is that people are now increasingly using real backgrounds for virtual meetings.  Both virtual and actual backgrounds are acceptable during online meetings. However, there are at least four important things that work-from-home warriors should consider when choosing to share their real backgrounds given that many of us are still working from home offices.


Read More
More Articles Tagged with 'COVID-19'

EVENTS

Webinar

7/22/20 to 7/22/21
Contact: Vania

Returning to Work: Contact Tracing and Beyond

ON DEMAND: The purpose of contact tracing is well understood, but there are many misconceptions about how it works, who it should apply to, and how to implement it. This webinar will clarify these issues and will recommend specific capabilities that businesses and government organizations should consider when selecting contact tracing solutions.

Read More

Webinar Solutions by Sector

7/28/20 to 7/28/21
Contact: Vania

Covid-19 and Healthcare Security: Responding to the Unpredictable

ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.

Read More

Webinar Solutions by Sector

8/13/20 to 8/13/21
Contact: Vania

The Pandemic's Impact on Organized Retail Crime (ORC)

ON DEMAND: Organized Retail Crime (ORC) is a serious problem that has been on the rise for several years. The unprecedented event of the current pandemic will rival or even exceed any previous events. If COVID-19 by itself wasn't bad enough, add civil disturbance, bail reform, and the state of law enforcement, and you have a perfect storm.

Read More

Webinar

8/19/20 to 8/19/21
Contact: Vania

Looking Beyond Access Control: Safeguarding People and Assets During COVID-19

ON DEMAND: Right now, in the pandemic environment, business leaders are balancing internal priorities – managing cost and impacts to productivity – with market and external priorities like government requirements, customer needs, and perceived standards of safety and health.

Read More

Webinar

9/1/20 to 9/1/21
Contact: Vania

10 Lessons Learned From Operating Essential Services During COVID-19

ON DEMAND: In this webinar, we intend to share some real stories. What were your challenges? What solutions did you deploy to address these challenges? What were your results? As part of this webinar, we will also discuss business continuity and resilience and how we can continue to plan for residual risk in a changed world.

Read More

Webinar

11/10/20 to 11/10/21
Contact: Vania

Increasing Employee Safety While Working from Home

ON DEMAND: Almost twice as many employees are now working from home as in traditional workplaces in response to COVID-19. The Stanford Institute for Economic Policy Research estimates that work from home (WFH) currently accounts for 60% of economic activity in the U.S., and many of these policies are expected to remain either permanently or for the long-term.

Read More
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Sponsored content bnp covid  3j9fmqpy3i  1
Sponsored By
SureView Operations

How command centers are responding to COVID-19

In recent months, I’ve had many different conversations with our customers about how the COVID pandemic has impacted their security operations—from global companies with hundreds of thousands of employees to much smaller organizations with control rooms responsible for local operations and campuses. The overwhelming feedback is that everyone has needed, in one way or another, to change their processes, and expect to continue having to do so for the foreseeable future.

Popular Stories

USA flag

China has stolen the personal data of 80% of American adults

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

cyber

Top 10 cybersecurity predictions for 2021

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

2.16_SEC_SBS_REV_360X180_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing