Archives: December, 2012

Doug Bedell — December 28, 2012, 11:26 am

For Web Security Awareness, A Note About ‘Phishing’

Bruce  Schneier passes along a woebegone story on how easy it is to become the victim of “phishing” on the web. What’s phishing? Wikipedia defines it as “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic […]

Doug Bedell — December 26, 2012, 1:05 pm

Top ‘Myths’ of Data Security

Digital concerns – the web, computers and information technology in general – have become a focal security concern. It’s not only by breaching its fences that an organization can be attacked. Intruders can break-in via its “digital transom” as well. Most business people are aware of that, so much so, in fact, that there’s a […]

Doug Bedell — December 21, 2012, 3:31 pm

The Holidays Can Be ‘Heisting Time’

We don’t want to sound like Scrooge for the holidays, but the fact is they are a time of heightened temptation for evildoers. The Home Toys blog has   a discussion of holiday hazards – ‘Tis the Season of Safety and Security – that’s worth your attention between shopping outings. Burglars and their attentiveness to […]

Doug Bedell — December 19, 2012, 1:58 pm

‘Real’ Security Truly Challenging

Bruce Schneier is reviewing a new book on security matters that should interest just about anyone in the field. It sounds like a fine-grained look at day-to-day aspects of security in our perplexing world. The book is Against Security: How We Go Wrong at Airports, Subways and Other Sites of Ambiguous Danger, and it’s by […]

Doug Bedell — December 17, 2012, 9:21 am

2012 a Pivotal Year for the Internet

With the Internet becoming an increasingly active setting for corporate security information and systems, Ronald Marks on  the Security Debrief site writes about 2012’s digital challenges and why  “the New Internet is not going to be your father’s Internet.” Part of the reason is that governments are maneuvering to control the ‘Net, the locale of […]

Doug Bedell — December 14, 2012, 1:29 pm

‘Biowatch’ Homeland Security Program Defended as Worth Continuing

For organizations with biological weapons on their security agenda, here’s a spirited response to a number of recent articles in the Los Angeles Times that branded the costly Department of Homeland Security program as not worth continuing. Stephen P. Bucci, a research fellow at the Heritage Foundation, thinks BioWatch is definitely worth maintaining. “Yes,” Bucci […]

Doug Bedell — December 12, 2012, 11:33 am

Regional Anti-Terrorism Drills a Good Practice

Austin, Texas, recently conducted a full-scale,  regional anti-terrorism response drill. Unpleasant as such events are to contemplate, they are, unfortunately, not beyond imagining in any part of the U.S. What can be reasonably imagined ought to be prepared for. Central Texas public safety agencies spent 40 hours assessing and insuring their capability to work together […]

Doug Bedell — December 10, 2012, 11:21 am

Getting Up to Speed on Internet Security

Intruders seeking to do a given facility harm don’t have to enter via the front gate or a break in perimeter fencing any longer. They can whiz right in from the Internet over a computer network. More and more businesses, schools and military sites are becoming sophisticated about blocking cyber (computer) attacks. If your organization’s […]

Doug Bedell — December 6, 2012, 1:12 pm

Something New In Site-Spying: A Teeny, Tiny Hovercraft

Imagine flying a spy camera through an open window at a facility you’re interested in. That can now be done, and not just in theory. Helen Greiner, who co-founded iRobot and now heads  CyPhy Works in Massachusetts, has announced two new drones – “Teeny tiny hovering drones designed to fly through your window and spy […]

Doug Bedell — December 4, 2012, 11:36 am

Contribute to ‘Lines of Hope’

PRO Barrier Engineering invites you to support the Lines of Hope Annual Campaign sponsored by the ASIS Foundation.  In 2007 one of our local ASIS chapter members discovered that our wounded military personnel were being charged for phone calls to parents, spouses, children and loved ones while they were recovering at the Walter Reed Hospital. […]