Janitorial crews are often neither seen nor heard, starting their work shifts after most employees have gone home. This level of freedom can cause security problems related to more than just incidents of theft. Workers in these jobs tend to be poorly screened or not backgrounded by the firms who hire them, mostly because the […]
There is no denying the importance of bringing information technology (IT) and physical security personnel together to make sure these two worlds do not collide. A united front is essential when it comes to fighting against the many threats coming from all directions these days.
In an increasingly perilous web environment, server-level security is an imperative. Your server and IT infrastructure are vulnerable to numerous threats on the web, and thus, comprehensive security is a must.
Maintenance on security equipment can get ignored until those devices fail—and often under the worst circumstances. It’s critical to schedule maintenance and stay vigilant for any needed inspections, adjustments, or repairs, even on newly installed equipment.
The orientation process for new employees can be like drinking from a fire hose, with a lot of information—and not all of it completely relevant for them—in a short period. The Security department may play a large or small role in this discussion, and it’s critical that the presenters provide consistent, useful information that the […]
Almost every employee in the company is submitting a time-off request as the summer heat kicks into high gear. While workers’ minds are focused on their getaway plans, it is important to spend the time before the mass exodus begins to address the physical and cybersecurity measures needed to protect the company against data breaches, […]
It’s all too easy for many employees to consider workplace security as someone else’s job. They often assume the responsibility lies with management, security staff, surveillance cameras, the IT department, or the police. That can be true to an extent, but for security to really be effective, everyone at the company must be involved.
The price you have to pay for an unsecured IT infrastructure can be costly. A data breach, one of the most common IT security threats, can cost a company huge tangible losses to the tune of $4 million.
With the arrival of hurricane season comes the potential for significant damage, loss of life, and housing and electrical power difficulties for those in their paths. While emergency management officials put most of their efforts toward helping residents, security practitioners still must protect their facilities, before, during, and after hurricanes.
The technological landscape has changed drastically since the turn of the century. With thought leaders in Silicon Valley and young entrepreneurs looking to disrupt the technology marketplace through continual development, it seems like there is no end in sight to these changes. One outcome of this ceaseless development is that C-suite security and information executives […]