In the January 2014 issue of Security Magazine, read about the role of the Chief Information Security Officer and how important they are to your company. Find out how to prepare your company for a natural disaster, training your security officers to spot a fake ID, and read about the latest trends in security for the New Year! Also, find out how jury settlements have a big impact on your enterprise security.
The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.
Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.
Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.
To most people, the term “access control” refers to beeping key-card readers, little lights turning from red to green, doors unlocking and turnstiles opening, but access control also happens to be one of the most important duties that a security officer is tasked with.
When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.
When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.
RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.
In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.
Regardless of a jury settlement outcome, lawsuits and their resulting publicity leave a stigma and often result in loss of business, not to mention difficulty finding insurance coverage
A security executive’s primary strategy should be to prevent lawsuits from happening, so hiring practices and vetting of security firm partners are the first defense. All security officers must be subjected to criminal background and employment history checks.
To best protect your company against internal abuse, it is helpful to understand the nature of the threat and to consider applying risk-based approaches to address the problem.
Let’s start with the good news. Malicious insider activity is relatively rare. Unfortunately, even though outsiders account for 85 percent of cybersecurity incidents, the damage often is substantially greater when an insider strikes.
Small business doesn’t necessarily mean small data.
January 6, 2014
Small business doesn’t necessarily mean small data. In fact, according to Michael Bruemmer, vice president at Experian Data Breach Resolution, thieves prefer to target small- to medium–sized businesses (SMBs) because many lack the resources or expertise to manage cybersecurity. Retailers are especially easy targets for cybercriminals who look to hijack credit card data, but customers aren’t the only victims.
During the past 20 years, product technology within the analog security video industry had been very stable, with only minor product advances.
January 6, 2014
In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this historical norm. The needs of small and midsized businesses (SMBs) are moving in the opposite direction of enterprises, where the surveillance needs are getting more closely aligned with the enterprise’s IT requirements.