Archives: August, 2017

Doug Bedell — August 30, 2017, 4:38 pm

Vehicles Becoming Terrorist Weapons of Choice

The times are making us more subject to vehicle attacks, and in need, as well, of more vehicle barriers. What times? Times in which – and this was last summer – ISIS can send “a message to its supporters telling them to run over ‘disbelievers’”. “This has led,” the Security blog continues, “to some reports […]

Doug Bedell — August 28, 2017, 8:19 am

Americans’ Fears of Terrorism, Cyber Attacks Shown Growing

Security InfoWatch advises that the fears of Americans over security and cyber attacks are increasing fairly sharply, citing the 2017 Unisys Security Index as grounds for its advisory. “The study, which was based on online surveys of at least 1,000 U.S. adults,” says InfoWatch, “found that 68 percent of Americans were seriously concerned about national […]

Doug Bedell — August 23, 2017, 10:20 am

Out-of-Date Software a Big Computer Security Risk

When hospitals in the United Kingdom focused on what had left them defenseless in a recent computer hacking attack, administrators realized they were running Windows XP, which was out of date and vulnerable to attacks. Thus the Clearswift blog advises that “Running critical infrastructure on outdated software is incredibly risky.” In the UK, “It was […]

Doug Bedell — August 16, 2017, 2:47 pm

Good Security Takes Continuing Attention, Discernment

Good security starts with continuing attentiveness to what is being kept safe from intrusion. The attendent circumstances don’t lend themselves to trivialization or distortion, as Brian Krebs discusses in a post headed “Beware of Security by Press Release”. As Krebs explains, “It goes a bit like this: A security firm releases a report claiming to […]

Doug Bedell — August 14, 2017, 4:07 pm

Security Readiness Requires Planning, Preparations

Unfortunately, the presence of vehicles driven (let’s say wielded) as weapons has been much in the news of late. That’s nothing for a barrier company to seek capitalize on, but it is the nature of current reality, and reality is our context. Here’s an excerpt from a Security InfoWatch post discussing the reality of weaponized […]

Doug Bedell — August 10, 2017, 1:58 pm

Suppose a Security Emergency Hits, Say, Your Mall…

When there’s a security-related issue at hand, whether it involves theft, intrusion or, indeed, weather itself, the people at risk need to know about it. So, as an example in an educational setting, Caroline Hamilton advises about “Planning and Implementing a Campus Mass Notification System,” on the Security InfoWatch blog. “Every organization,” Ms. Hamilton writes, […]

Doug Bedell — August 9, 2017, 10:01 am

Security Remedies Take Time – Start Planning Now

“Obsolete/inadequate physical and digital perimeter protection capabilities.” Those are among today’s top five security drivers as noted analyst Kevin Coleman sees them and the Security blog reports. “Consider the physical and digital threats that were at the top of our minds 18 to 24 months ago,” Coleman writes. “Only a small percentage can get all […]

Doug Bedell — August 7, 2017, 12:19 pm

Applying Heavyweight Thinking to Lighten a Marine’s Pack

PRO Barrier Engineering is an innovative company and we look with regard on ingenuity wherever it’s applied – as in this means of reducing the pack weights Marines have to carry on their backs. DefenseTech reports on the outcome of the Marines’ 2016 Innovation Challenge (enterprising in itself), in which Staff Sgt. Alex Long has […]

Doug Bedell — August 4, 2017, 1:56 pm

You Think This Sounds Fishy? Well, It’s Not

If it’s one of the latest models, not even your fish tank may be secure. Truly. The Washington Post reports how hackers stole data from a North American casino “by using an Internet-connected fish tank”. “The fish tank had sensors connected to a PC that regulated the temperature, food and cleanliness of the tank.” “‘Somebody […]

Doug Bedell — August 3, 2017, 8:43 am

Mobile Employees Can Pose Cyber Security Risks

Many business offices are functioning as though they don’t have walls, the Clearswift cyber security blog notes. That’s because their increasingly mobile employees are using portable computers, iPads and cellphones for business purposes. And those mobile devices may not be as secure as their office counterparts. So how do we insure the security of out-of-office […]