Tag: security

Mandatory Drug Screenings Could Have Negative Repercussions

Employers often feel an obligation to implement a drug screening program in the workplace, typically with the safety and security of the workforce in mind. It is used as a precaution to ensure people who would be a danger to others aren’t hired. Random testing is also used to discourage employees from using drugs after […]

Man checking work email in bed

How to Stop Thinking About Work After Hours

Relaxing properly is essential to maintaining your physical and mental health, and it has never been more necessary than for security professionals during the COVID-19 pandemic. (The Japanese actually have their own word, karōshi, to refer to death from overwork.) This is especially true for security professionals. Failure to relax can negatively impact the quality […]

Cars in parking lot flooded during Hurricane Harvey

Will You Be Ready When the Next Storm Strikes?

As a security leader,  it’s important to be ready for any emergency, and that includes preparing for weather emergencies. So, when that dreaded alert from the National Weather Service pops up on your computer or phone: “Area Flood Warning” predicting storm activity such as  high winds and heavy, sustained rainfall for your area, will your […]

Stressed out worker.

Right Now, Hackers Are Interacting with Your Employees—Are They Prepared?

Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]

Login screen on laptop

Online Security in the Age of Increased Remote Workers

As diagnosed cases of the coronavirus continue to spike in much of the United States, “social distancing” has entered the common lexicon—and has cemented its hashtag status on social media. Many companies find themselves pushing back their formal return to office dates, and are continuing to encourage employees who can work from home, to continue […]

Starting Your Security Consulting Practice

Many security practitioners leaving military or government service and retiring federal, state, and local law enforcement officers feel the desire to start their own security consulting companies using the skills they’ve developed over their long careers. But they often find that what worked well for them in the bureaucratic structure of their past work environments […]

Fishing hook through Enter Key

Beware of Phishing Attacks—Actionable Advice to Protect Your Company’s Data

As the COVID-19 pandemic continues to unfold, we are all being forced to adjust our new daily routines, and this includes cybercriminals. Since the start of the crisis, security teams are reporting an overall rise in all types of cyberattacks, ranging from phishing, account takeovers, and even activating long-dormant ransomware attacks. Keeping in mind that […]

Security guard working in retail environment.

Employee Theft in Today’s Climate

Many businesses who have the means are now moving to a remote work setup for their employees as a precaution for today’s climate. For businesses deemed “essential” like grocery stores and other retailers, employees are working with elevated risks and stress throughout the day. The increased pressure on employees both working both in-person and remotely […]

Why Aren’t Posted Orders Followed?

The posted orders at a security officer’s position exist for a reason. Their existence provides rules, responses, and a formalized structure for the officer’s work shift. So why are posted orders so poorly written or not followed? What are the liability concerns if they aren’t followed? How can site security managers craft better orders?

International

Supply Chain Threats Pose Unique Risks, Demand Unique Solutions

As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]