While workplace violence can happen in any industry or occupation, healthcare and social services workers face a high risk of job-related violence. Workplace assaults ranged from 23,540 and 25,630 annually over a 3-year period, and 70% to 74% of those occurred in healthcare and social services settings.
On April 10, 2017, a 53-year-old man walked into a special needs classroom in San Bernadino, California, pulled out a gun, and shot his estranged wife, 53-year-old Karen Elaine Smith. Two children standing near Smith were also hit by gunfire; 8-year-old Jonathan Martinez died later at the hospital. The gunman then turned his gun on […]
Data breaches have always existed. They certainly predate computers, strange as that might seem, because a “data breach” is simply when information (usually of a sensitive nature) gets into the wrong hands. As long as humans have been storing information of any kind in any way, there have been other humans who have tried to […]
Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]
Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]
Whether it’s necessary to gain a promotion, maintain a security-related (and hard-earned) certification, finish a college or university degree program, or continue to demonstrate competence in their particular fields or industries, security professionals must go to live programs or take security education online courses on an ongoing basis.
The posted orders at a security officer’s position exist for a reason. Their existence provides rules, responses, and a formalized structure for the officer’s work shift. So why are posted orders so poorly written or not followed? What are the liability concerns if they aren’t followed? How can site security managers craft better orders?
As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]
Workplace harassment is a pervasive issue that too often gets overlooked or simply dismissed by those with the authority to address issues before they escalate. Maybe employees on the receiving end of a workplace bully don’t feel comfortable reporting the incidents, or perhaps they don’t know what resources are available to them. Who should they […]
In this day and age, when many companies house much of their critical information and infrastructure online, it’s imperative to plan ahead. What would you and your company do in the event of an emergency or sabotage?