Archives: 'Security Planning'

Doug Bedell — June 13, 2017, 10:03 am

New York City’s Security Setting

PRO Barrier Engineer Rich Lawrence provides a PDF copy of the Spring, 2017 issue of Security Director, published by ASIS International’s New York City chapter. Get caught up on how New York is meeting its security needs – a comprehensive run-through.

Doug Bedell — June 12, 2017, 10:26 am

Pluck Your ‘Low-Hanging’ Cyber Security Fruit – Could Be Enough

For a good overview on how to confront the security needs of your organization, Government Security News offers Katherine Teitler’s “5 Ways to Find the Low-Hanging Fruit on Your Network.” “Though securing everything which needs securing — hardware, software, applications, data, people — is by no means a light lift,” Ms.Teitler writes, the security team’s […]

Doug Bedell — June 8, 2017, 3:40 pm

Become an “A” Student of Cyber Security

Cyber security – we’ve been on this subject before, but it’s one that bears repeating and refining. Computer breaches are becoming all too common so Diane Griffin on the Security Directions E-Magazine offers “5 Ways to Strengthen Your Cyber Security”. It’s a post from last year, but one that remains applicable today. Ms. Griffin advises: […]

Doug Bedell — June 6, 2017, 8:43 am

Schools Being Protected From a Security Control Center

The public schools in Littleton, Colorado, are demonstrating how security principles can be applied to an entire school system, with the state of the electronic art monitored from a single control center. “Staff,” advises the Security Industry Association, “can watch video feeds displayed on a wall of 16 screens and view access control information for […]

Doug Bedell — June 2, 2017, 11:13 am

Homeland Security Issues Semiannual Report to Congress

Government Security News advises that the Department of Homeland Security has published its Semiannual Report to Congress, and that GSN is publishing selections of its key topics. Such topics include Securing Cyberspace and Information Technology Assets, Secret Service challenges, Evaluatiion of SHS’ Information Security Program and Security Controls for the Transportation Security Administration.

Doug Bedell — May 24, 2017, 12:06 pm

Digital Security Breaches Setting World Records

Amid all the coverage of digital security breaches so far this year, it’s not surprising to learn that “data breaches and software vulnerabilities look set to break new records in 2017, if first quarter trends are any indication.” That’s DarkReading’s conclusion as it reports that “Risk Based Security’s analysis of Q1 data showed there were […]

Doug Bedell — May 17, 2017, 8:05 am

Insight Into the ‘Wanna Cry’ Ransomware Attacks

SecurityInfoWatch takes us into the digital chaos produced by the “Wanna Cry” ransomeware attacks. The infection was spread via a massive email spam, exploiting a vulnerability in the Windows OS, which Microsoft released a security patch for in March. Computers and networks that did not install the patch to help protect their systems are at […]

Doug Bedell — May 7, 2017, 8:50 pm

Beware What You Think You See If You’re Meddling In Security

On DarkReading, Joshua Goldfarb provides a meditation on rushing to judgement and/or mocking the makers of mistakes. “Do you think that if someone were to mock me,” Joshua asks, “it would make me feel better about the mistake I’ve made, or somehow encourage me to learn from it?” Just the opposite. “Mocking people causes them […]

Doug Bedell — May 5, 2017, 9:39 am

Robots, Too, Can Be Subject to Hacking

We’ve been noting the arrival of industrial and security robots, but as with their human counterparts, they’re not without problems. DarkReading reports on how researchers hacked an industrial robot, causing it to draw a “slightly skewed” line when the mechanism thought it was a perfectly straight one. The robot’s “straight line” was off by off […]

Doug Bedell — May 3, 2017, 8:59 am

Beware: Small Businesses Subject To Hacking Too

Big businesses or small – both sizes are subject to cyber security attacks. There’s no safety in smugness for either size. Security Infowatch warns that “Many small businesses fall under the false impression that criminals will only target large or even medium-sized businesses given the higher potential pay out; however, nearly half of all cyber-attacks […]