Archives: 'Business Risk Planning'

Doug Bedell — August 1, 2018, 3:04 pm

Data Stored ‘In the Cloud’ – Where’s That? It’s Vital to Know

In computer security, people get confused over the term “Cloud”, such as in storing information safely in “the Cloud”. Adnan Raja discusses the subject of Cloud security in a post on the securitymetrics blog. The Cloud is a term for online storage of backup information, as provided by Google, Apple, Amazon, IBM or lesser known […]

Doug Bedell — July 31, 2018, 11:17 am

Insiders Can Be Vexing Security Threats

Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards. “The key to dealing with insider threats,” Vijayan writes, “is to keep […]

Doug Bedell — July 24, 2018, 12:23 pm

Hiring Contract Security Guards May Be Cost-Effective

SecurityInfoWatch offers a primer on hiring security guards from contract providers. “You must pay the firm for its services,” the advisory reads, “on top of paying for the cost of wages, training, projected overtime, vacation accrual, payroll taxes, uniforms, benefits, and other specified or mutually agreed upon services.” Even so, “The cost of hiring a […]

Doug Bedell — July 20, 2018, 11:03 am

‘Stories From the Field’ On Covert Operations

For a change of pace, Protection Circle offers some “stories from the field” on how covert security operations can be difficult, risky, expensive, or just funny, to manage. Such as, “…a production company client from Los Angeles that wanted a certain celebrity who was attending an event in San Francisco to receive covert protection. This, […]

Doug Bedell — July 16, 2018, 12:30 pm

Cybersecurity Breaches in 2018 – ‘So Far’

Following up on Briefs’ last post on cyber crime, here, from Wired magazine, are “The Worst Cybersecurity Breaches of 2018 So Far”. Wired’s warning: “Corporate security isn’t getting better fast enough, critical infrastructure security hangs in the balance, and state-backed hackers from around the world are getting bolder and more sophisticated.” The examples range from […]

Doug Bedell — July 11, 2018, 1:31 pm

Digital Insiders Can Be As Disruptive As Outsiders

Perish the thought, but the reality is that security disruptions – digital disasters – can be caused by insiders in an organization as well as faceless hackers. As proof, DarkReading.com discusses “The 6 Worst Insider Attacks of 2018 – So Far” in which “stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the […]

Doug Bedell — July 9, 2018, 11:13 am

U.S. Cybersecurity Effectiveness Questioned By An Observer

Don’t count on the Department of Homeland Security to insure protection against cyber-attacks on U.S. businesses and government agencies, the Homeland 411 blog advises. “Chronic under staffing, insufficient resources, and a lack of cyber-prioritization has left government systems and critical infrastructure vulnerable to attacks and has placed DHS’s cyber goals far from reach, according to […]

Doug Bedell — July 5, 2018, 2:25 pm

No Doubting It: Enterprises Need a Cybersecurity Plan

Computer hackers with access – granted or created – to a business file can do great harm to the business involved. A security truism these days? Of course. But Joe Granitto on Security InfoWatch follows up with practical suggestions on protecting your data. “Defending your operations and reputation,” he writes, “requires a holistic cybersecurity plan, […]

Doug Bedell — June 29, 2018, 3:20 pm

Stopping and Thinking in a Pell-Mell Digital Time

The security sector has been steadily changing over the past decade. While controls over physical entry, such as barriers, remain essential, security has become a digital enterprise, too, with the threats coming from “out there,” that is the Internet. A blog post by SIA, the Security Industry Association, is helpful in grasping the new context. […]

Doug Bedell — June 26, 2018, 8:58 pm

Tasers, Pepper Spray No Shield Against Bullets in Target Settings

With the best of intentions, SecurityInfoWatch has a post discussing how schools and businesses are turning to “non-lethal solutions for active shooter mitigation.” That’s all very well, but a shooter with a gun has it over anyone else in terms of range. The shooter can stand-off in a deadly manner, protected by a distance advantage […]