Latest Articles

Data Privacy Violation Concept

Not All Clouds Are Created Equal

Data breaches have always existed. They certainly predate computers, strange as that might seem, because a “data breach” is simply when information (usually of a sensitive nature) gets into the wrong hands. As long as humans have been storing information of any kind in any way, there have been other humans who have tried to […]

3D rendering Central Computer Processors CPU concept. Electronic engineer of computer technology. Computer board chip circuit cpu core. Hardware concept electronic device motherboard semiconductor

Non-Malware Attacks: What They Are and How to Protect Against Them?

Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]

Stressed out worker whose computer got hacked.

Right Now, Hackers Are Interacting with Your Employees—Are They Prepared?

Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]

Continuing Education for Security Professionals

Whether it’s necessary to gain a promotion, maintain a security-related (and hard-earned) certification, finish a college or university degree program, or continue to demonstrate competence in their particular fields or industries, security professionals must go to live programs or take security education online courses on an ongoing basis.

Popular Articles

Is There a Value to Professional Security Certifications?

The security world is full of professional certifications, ranging from the plethora of initials offered by ASIS, to homeland security designations, to a fraud examiner’s certification, to others related to crisis management, threat management, and even critical incident stress. Do the examination costs, recertification fees and costs, and study time make sense for security professionals […]

The Challenge of New Federal OSHA Guidelines for Workplace Violence Prevention

The federal Occupational Safety and Health Administration (OSHA) has created new guidelines for workplace violence prevention, measurement, and response. Its purpose is to help organizations address when a workplace violence perpetrator violates OSHA’s well-known General Duty Clause (GDC), which says employees must protect their employees from all types of physical harm.

New TSA Travel Rules May Put Stress on U.S. Travelers Returning from Overseas

Recent changes and pending new ones in travel restrictions for airline passengers coming from certain Middle East countries have banned the possession of laptop computers inside the cabin of the plane. More changes may be forthcoming, including adding 71 additional international airports to the current list.

Lockdown

What Is the Difference Between Shelter in Place and Lockdown?

It is important to determine suitable shelter-in-place locations and lockdown rooms in a facility before an incident. Knowing what characteristics make a room more conducive to shelter in place or secure in place (lockdown) helps to avoid danger during an incident.

Employee handbook on a wooden table and glasses.

Employee Handbooks: The Vital Link in a Cybersecurity Chain

When it comes to cybersecurity, two factors are coming together in a worrying way. One lurks in the results of a survey, conducted by the Association of Corporate Counsel, that shows employee error is the leading cause of data breaches. The other was revealed in research carried out by CompTIA, which discovered that almost half […]