Archives

5 Safety Measures for Your External Premises Security

Business owners with workplaces or commercial premises have a duty to provide a safe environment for workers and visitors alike. This includes protecting people within the grounds while keeping the premises safe from breaches of security. Below, we discuss five essential safety measures for the external protection of your premises. 1. Strengthen Entry Points Once […]

court

SCOTUS Limits Scope of Cybersecurity Law

The U.S. Supreme Court recently issued a ruling interpreting the scope of the Computer Fraud and Abuse Act (CFAA), a 1986 federal statute that imposes civil and criminal liability for unauthorized computer access. In short, the Court decided that as long as an individual is authorized to access a computer and data, he doesn’t violate […]

work from home

Study: COVID Shift to Remote Work Led 80% of Organizations to Boost Focus on Identity Security

The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, has released a study titled, “2021 Trends in Securing Digital Identities,” based on an online survey of over 500 IT decision makers. The report examines the impact that the […]

police tape

Employee Unwellness and the Rise of Workplace Shootings

Workplace violence has been a problem in California and across the nation for decades, and it appears to be getting worse. Some governmental estimates have identified up to 36 mass killings in California workplaces in the last decade, including five since the start of 2021. According to a Society for Human Resource Management (SHRM) study, […]

National Lab’s ‘Shadow Figment’ Tech Foils Cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]

remote worker

Businesses Need to Prioritize Cybersecurity for Their Remote Workers

Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]

Best Practices for Data Breach Detection, Response

It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]

Man in office using personal devices for work.

BYOD Security Risks

We’ve talked before about the reasons an employer may benefit from implementing a bring-your-own-device (BYOD) policy in the workplace, such as cost reduction, improved employee satisfaction, the likelihood of better technology standards, and the decreased time to productivity on a personal device, just to name a few. But there are quite a few security risks, […]

Workplace Violence Citations Upheld by Federal Judge

A Department of Labor (DOL) administrative law judge, Dennis Phillips, found hospital management companies UHS of Delaware Inc. and Premier Behavioral Health Solutions of Florida Inc. exposed workers to workplace violence and showed bad faith by allowing the destruction of surveillance videos showing instances of workplace violence at a Bradenton, Florida, psychiatric facility. Phillips assessed […]

Pipeline Cyberattack Results in FMCSA Issuing HOS Exemption

On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.