Her name was Sandy, and after a brief visit, the lights were out, thousands homes and businesses were damaged or destroyed and emergency planning programs were put to the test.
Thief! Intruder! Birdwatcher? Sometimes, perimeter security puts you in contact with a variety of visitors, not all of them welcome, but how does one differentiate between visitors without making a bad first impression or creating a vulnerable situation? And how does that situation change based on a facility’s location and risk profile? Three security executives weigh in on the issue.
First of all, it is better to hard-wire security video, especially when it comes to megapixel cameras. But there are times, locations and missions where wireless makes the best sense.
The rise in global security incidents, diminished budgets and downsized security programs have left organizations to deal with security risks that are neither well-understood nor consistently addressed. Executives around the world feel confident that they’re winning the high-stakes game of information security despite the growing number of obstacles, according to The Global State of Information Security® Survey2013 by PwC U.S. in conjunction with CIO and CSO magazines.
As managers and leaders in the security field, our first and most sacred responsibility is, of course, to provide for the safety of the people who fall within our areas of responsibility. As recent world events, from political unrest to natural disasters such as earthquakes, tsunamis, ash clouds and other events have shown, the unexpected can always present us with challenges in fulfilling our Duty of Care to our international travelers, expatriates and their dependents.
There are five basic tenets that can mitigate risk in K-12 schools across the U.S., says David Esquith, Director, Office of Safe and Healthy Students for the U.S. Department of Education
The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone technology. However, the smartphone isn’t going to be used for real-time voice, but will instead be a “must have” device for surveillance operations.
When Security magazine approached us to write a monthly column, we took some time to ponder how to best serve the current and emerging security leaders which are this column’s target audience. We are delighted to have this opportunity to explore a broad range of topics in today’s complex environment of risk, threats and hazards.