Archives: 'Security Planning'

Doug Bedell — June 18, 2018, 10:49 am

Apple Updating 911 Emergency Calls With HELO System

We’re not huckstering for Apple, but the tech giant will be including a feature in its new iOS 12 software to be released later this year that “will automatically share your location with emergency responders, so they know exactly where to find you,” if, of course, you need them. This according to Tom’s Guide, a […]

Doug Bedell — June 13, 2018, 3:28 pm

Living Safely and Securely Takes 10 Steps to Everything

If you want to live and work securely, and are serious about those aims, we invite you to Johnathan Bancroft’s Security magazine post on “10 Hotel Safety Tips from a Former Intelligence Officer”. Bancroft is truly security conscious, just follow behind him as he checks into a hotel. He requests “a room between the second […]

Doug Bedell — June 11, 2018, 10:34 am

U.S. DHS Develops a Plan for Soft Targets and Crowded Places

The U.S. Department of Homeland Security is getting personal in its approach to protecting people. DHS has released a “Soft Target and Crowded Places Security Plan Overview” that “describes how the Department is working to enhance and organize its efforts around the security and resilience of soft targets and crowded places across the United States.” […]

Doug Bedell — June 4, 2018, 3:13 pm

Shoplifting a Huge Security Problem at Retail Stores

Here’s a security problem that you don’t hear much about but is a bane for retailers – shoplifting. Security InfoWatch reports that “According to the 30th Annual Retail Theft Survey conducted by Jack L. Hayes International, more than 432,000 shoplifters and dishonest employees were apprehended in 2017 by just 21 large retailers who recovered over […]

Doug Bedell — June 1, 2018, 10:47 am

Locksmiths Are Good Security Writers, Too

Where better to find a treatise on the basics of site security than the United Locksmith blog, Lock Blog? Here Lock Blog offers, “10 Things You Need to Consider About Perimeter Security.” Get the basics, from Locks to Access Control, in nicely condensed descriptions with Key Takeaways for each of the 10 items. Locksmiths need […]

Doug Bedell — May 30, 2018, 11:39 am

Social Media’s Links to Violence: Read Your Screens Warily

Risk seems to be closing in around us in security terms: Now the Security magazine blog is warning of “6 Links Between Social Media and Violence You Haven’t Thought About”. On its perverse side, social media posting is being linked to mental health, righteous indignation, long -term relationships, fixation and even attack planning. Says Security: […]

Doug Bedell — May 29, 2018, 1:01 pm

U.S. Homeland Security Updates Internet Safety Tips

The U.S. Department of Homeland Security has updated its guidance from 2015 on home network security via the internet. “Home network security,” DHS explains, “refers to the protection of a network that connects devices to each other and to the internet within a home. Whether it’s staying in touch with friends and family, paying your […]

Doug Bedell — May 21, 2018, 3:21 pm

Tracking People Via the Location of Their Cell Phones

Anybody looking for you? Got a cellphone? Lisa Vaas on Naked Security reports how it’s now possible easily to “find the real-time location of nearly any US (cell)phone to as close as a few hundred yards.” Security blogger Brian Krebs broke this news earlier this month and it’s now being elaborated on somewhat. Krebs wrote […]

Doug Bedell — May 19, 2018, 11:13 am

Information Security Is Worth Some Specialized Learning

The DarkReading blog has a valuable series of posts on providing information security, a discipline that some organizations don’t understand or practice very well. It’s becoming all the more focal as cyber threats mount in these digital times. The series of slides is entitled “5 Ways to Better Use Data in Security.” It’s worth spending […]

Doug Bedell — May 16, 2018, 11:41 am

In Security and Elsewhere, A ‘Just Culture’ Is a Worthy Aim

A forthright announcement the other day by Twitter – that it had accidentally placed some user passwords in jeopardy – brought, no surprise, an uproar from the press and some users. The Securiosis blog uses this episode to spark a discussion of the need to adopt “just cultures” in organizations – that is, to understand […]