Archives: 'Business Risk Planning'

Doug Bedell — December 9, 2019, 1:09 pm

Tune-In to Today’s Risk Realities

On his Security website, Bruce Schneier refers us to a spot-on, in-person talk on risk assessment by Andy Ellis, the chief security officer of Akamai. From an earlier post of his own on assessing risk, Schneier notes all too appropriately that “The problem is our brains are intuitively suited to the sorts of risk management […]

Doug Bedell — December 6, 2019, 10:44 am

Armed or Not? Most Security Officers Don’t Carry Guns

The Protection Circle blog turns to a subject that arises occasionally: Should security officers be armed? “The fact of the matter,” says the writer, “is that the vast majority of security officers are unarmed. This applies to facility and campus security, houses of worship security, corporate security, event security, travel security, executive protection, covert protection […]

Doug Bedell — December 2, 2019, 11:00 am

…Health Care Records Sickeningly Accessible for Computer Hackers

The Internet appears to be turning unhealthy for growing numbers of unsuspecting healthcare providers and users. ThreatPost reports that “October experienced a 44.44 percent month-over-month increase in healthcare data breaches, resulting in 661,830 healthcare records exposed or stolen during the month. A security blight is occurring. “The three most notable breaches of the month, according […]

Doug Bedell — November 29, 2019, 1:53 pm

Scammers Introducing a Web ‘Netflix’ Ploy

Here’s how scammers of Netflix and other sites can make your financial life miserable, as explained by the NakedSecurity blog. “For the most part, this email is disarmingly simple, and therefore surprisingly believable, for all that it’s given away by typos, grammatical mistakes and orthographic errors. “It’s not overly dramatic, it’s not threatening, and it’s […]

Doug Bedell — November 27, 2019, 9:54 am

Watch Out, Even, When You See .gov on the Web

Be wary, even, of a .gov domain name, Brian Krebs advises. “It’s way too easy to get a .gov domain name,” he writes. “Earlier this month, KrebsOnSecurity received an email from a researcher who said he got a .gov domain simply by filling out and emailing an online form, grabbing some letterhead off the homepage […]

Doug Bedell — November 22, 2019, 2:45 pm

‘Converged’ Security is the Ticket Now

Think it’s enough to focus on cybersecurity, or physical security or operational security alone? Not so, says Will Wise Security blog. “As threats evolve and bad actors become more intelligent, and with the goal of being proactive vs. reactive, the need for a robust, comprehensive, converged security strategy is paramount.” One-person shops probably knew this […]

Doug Bedell — November 20, 2019, 12:00 pm

A New Book on Today’s Security World

In Homeland Security advises of a new book on intelligence gathering and security matters – “Intelligence Operations, Understanding Data, Tools, People and Processes”. It’s described as a worthy successor to Allen Dulles’ “The Craft of Intelligence” of 60 years ago. “If Dulles’ book could be considered a primer on what the super-secretive Central Intelligence Agency […]

Doug Bedell — November 6, 2019, 12:54 pm

‘Lifelong Learning’ Has Special Security Relevance

One key security tool is lifelong learning about how security challenges keep changing and evolving. That’s the pertinent word from the ASIS International 2019 conference on “Why Lifelong Learning is Vital in the Field of Security and Threat Management”. Learning shouldn’t end when you reach a certain point in your career,” explains Dr. Nicole Drumhiller, […]

Doug Bedell — November 4, 2019, 11:27 am

Eyewitness Testimony Not Necessarily Reliable

The testimony of an eyewitness may not necessarily be a reliable security indicator, Dr. Jade Pumphrey of American Military University advises in a post on In Public Safety. The problem may be as much with the questioners as those being questioned. “During an investigation,” the post advises, “eyewitnesses may have several interactions with law enforcement. […]

Doug Bedell — October 31, 2019, 9:54 pm

Cyberattacks on Industrial Control Systems Likely to Grow

Threatpost says cyberattacks on industrial control system (ICS) networks are likely to grow in resolve and complexity. “Analysts expect them to evolve from attacks that have an immediate direct impact to those with multiple stages and attack vectors that are more stealthy.” ‘While it remains extraordinarily difficult to mount successful attacks on critical infrastructure because […]