• How to Bolster Data, Physical Security to Make Threats Go Elsewhere
    eWeek (12/07/15) Rash, Wayne

    Having adequate security requires organizations to think about the risks they are most likely to face and the resources they expect to have on hand. In addition to foreign hackers, risks could include someone sitting in the reception area who has connected via an Ethernet port and launches a man-in-the middle attack on the Wi-Fi router. Organizations need to examine who would benefit if it underwent a disruption, such as stolen server or a former employee connected to the network to download trade secrets. Organizations also need to conduct what security experts call “security in depth” or “defense in depth.” One expert recommends housing a server in a room with a solid door and a lock that requires a passcode to enter. An alarm should sound if the door is opened without the passcode or if someone enters the wrong code more than twice. Side doors or doors to the loading dock should be similarly equipped with secure locks and have alarms that go off if someone forces open the door, enters the wrong code, or if the door is propped open longer than a fixed time. The alarms should connect with the organization’s security control center, but if nothing happens, then they should automatically roll over to the police department. The receptionist should be an armed security guard who controls the locks in doors that lead further into the building, and unless someone shows the right ID or gets past the badge reader, they cannot enter.

    Web Link

  • Post-Paris, a Fundamental Rethink of Corporate Security Is In Order
    Forbes (11/30/15) Udell, Bill

    The recent attacks in Paris should push business leaders to incorporate security concerns into everyday operations, writes Bill Udell, a former CIA operations officer and the Los Angeles-based Senior Managing Director for crisis and security consulting at Control Risks. Because Islamic State is focused more on setting off numerous attacks than specific, “quality” targets, this means that any place where large groups gather could be at risk. The consequences of mismanagement are also harsher, Udell says, and so organizations must take care to protect their staff and assets. Corporations have reacted to the Paris attacks by placing “quick-fix” security support around their travelers and expatriates, and some are canceling corporate travel. In the longer-term, corporations will probably focus more on threat and risk monitoring, including their profiles, geographical locations, and personnel exposures. They will also focus on risk management and governance, increase their care of business travelers, reexamine security at facilities that were once considered low-risk, and may allow security departments to become more involved in employee screening. Organizations also should test and refresh their crisis-management plans to account for new, potential terrorism scenarios.

    Web Link

  • 12 Cost-Efficient Video Surveillance Strategies
    Security Magazine (11/01/15) Zalud, Bill

    Security video and surveillance has changed a great deal over recent years, and Bill Zalud, Security Magazine’s editor emeritus, offers several tips on how security professionals can get the most out of security video for the least amount of money. First, he recommends working closely with internal partners, such as IT, both to make the use of video surveillance more effective, but also to gain access to a larger budget pool. He also recommends taking advantage of recent advances, such as cloud-based video services and megapixel and panoramic cameras, the capabilities of which can reduce the number of cameras that need to be placed on site. There are also a plethora of both wired and wireless transmission options available today, giving security the flexibility to find the solution that best meets there needs. This includes power-over-ethernet, which can eliminate the need to run power separately to cameras. There is also a wide variety of storage solutions available, ranging from on device and onsite to cloud-based. Zalud recommends choosing a flexible and scalable solution, especially when transitioning from an analog to a digital system. He also recommends employing video analytics, which is only becoming cheaper as its capabilities increase.

    Web Link

  • 5 Keys to Building a Successful Active Threat Plan
    Security Magazine (10/13/15) Hart, Jay

    According to the Bureau of Labor Statistics, 5 percent of businesses experience an instance of workplace violence every year, and that rate rises to 50 percent among organizations with more than 1,000 employees. A 2014 report from the FBI that found that active shooter incidents were occurring on average once a month also found that almost half occur in businesses. These statistics make clear that it is important for businesses to have an active threat plan in place. One of the first keys to developing such a plan is simply getting everyone on board with the idea of having an active threat plan, since many people are resistant to the idea for a variety of reasons. Next, it is important that any such plan be relatively flexible, because active threat situations can vary greatly from one incident to the next. Such plans also need to be proactive, aimed at taking steps to prevent violence before it happens just as much as ensuring everyone’s safety when it does. Plans also need to be clearly and simply worded, exemplified by the simple maxim: run, hide, defend. Finally, plans should consider how customers should be informed of any active threat situation, if at all.

    Web Link | Return to Headlines

    Latest TSU Shooting Leaves Student Dead, Raises Campus Security Concerns
    Campus Safety Magazine (10/12/2015) Winn, Zach

    An Oct. 9 shooting at Texas Southern University (TSU) left one victim dead and another wounded in what is the fourth shooting incident on the campus since the beginning of the fall semester. In this latest incident, freshman Brent Randall and another man reportedly got into an argument with three other men outside of the University Courtyard Apartment Complex around 11:30 a.m. before shots were fired. Randall was pronounced dead at a nearby hospital and the other victim was alive after being shot twice in the chest. Two of the three suspects were apprehended, but one remains at large. Less than 12 hours before this incident, another shooting occurred in the same area with one victim suffering minor injuries and the suspect escaping. Earlier in the week on Oct. 6, a former student is believed to have shot a man on the campus’ main thoroughfare. Finally, little more than a month before, on August 27, a man opened fire in the University Courtyard Apartment Complex parking lot, killing one TSU student and injuring another. Speaking about the Oct. 9 shooting, TSU president John Rudley criticized a new law signed by Gov. Greg Abbott this summer that will allow concealed carry of firearms on Texas college campuses.

    Web Link

« Previous Entries