Archives: February, 2017

Doug Bedell — February 27, 2017, 2:46 pm

Get With It: Building a ‘Cybersecurity Culture’

With the Internet and digital communication being an increasingly powerful factor in today’s communication, there’s much to consider about the security of being “on the Web”. Joel Griffin, editor of Security InfoWatch, discusses this reality in a post on “How to build a more effective cybersecurity culture”. Griffin advises that “While senior leadership within most […]

Doug Bedell — February 24, 2017, 9:14 am

Securing Computers In Today’s Offices

We talk a lot about digital security, but here are “10 physical security measures (ital. added) every organization should take,” courtesy of TechRepublic. They start off with, “Lock up your server room.” If you have a small office without a server room, we assume that means, Keep your computer-containing office space darned secure.

Doug Bedell — February 22, 2017, 4:59 pm

Don’t Invite Spammers In

Here’s a simple, but important, security tip to ward off would-be attackers of your computer systems: Don’t open files or messages you don’t recognize. They may be spam carriers. Spammers can trick users into opening a rigged .zip file and… “Once the .zip file is opened, an .exe file that’s nested inside is activated and […]

Doug Bedell — February 21, 2017, 9:10 am

New Security Gear: Drones, Robots and Virtual Reality

Welcome a new set of staffers to security scenes just about everywhere: Robots and virtual reality rigs. The Security blog interviews an integrated security director on the prospects that site protection will become increasingly robotic. “I don’t think robots will ever replace humans 100-percent,” says Joe Young, Director of Cloud Monitoring Services for G4S Secure […]

Doug Bedell — February 19, 2017, 9:22 am

Know What You’re Protecting, and How Best to Do It

Before deciding how best to protect your physical security assets, know what you’re protecting. Sounds basic, and it is. But ASIS International provides a checklist for Physical Security Assessment that will help make your priorities assuredly valid and clear. ASIS lists four sets of tasks, each with a lot to consider, that will help insure […]

Doug Bedell — February 13, 2017, 10:23 am

Do You Have a Hacking Response Plan? You Need One

In these digital times, with computer hackers on the prowl, it’s important to have what Security Metrics calls an incident response plan. Six steps are involved in developing an effective anti-hacking plan, from identifying assets to be protected to training employees in following the plan. It’s time well-spent to consider how prepared you are to […]

Doug Bedell — February 10, 2017, 11:52 am

Security’s ‘People Problem’

Security is a people problem as well as a perimeter one. That might seem obvious, but the implications of too casual an approach to the people, especially employee, threat are compelling. It’s a reality of our digital times. That’s because employees are not only readily trusted, but carry around with them a variety of mobile […]

Doug Bedell — February 8, 2017, 5:03 pm

The Border Wall: Solid or See-Through?

Discussion continues on the nature of the wall to be built along the U.S.–Mexican border, and retired Marine General John Kelly, the new Homeland Security secretary, will have to sort it all out, in consultation, we presume, with President Trump. Not everybody wants a dense, solid barrier. Government Security News reports that “Border Patrol agents […]

Doug Bedell — February 6, 2017, 4:54 pm

‘Safer Internet Day’ Focuses on Creating Secure Passwords

Tuesday, February 7th, is Safer Internet Day, and F-Secure’s Safe & Savvy blog offers some suggestions on how to observe it. First, run updated security software on all your sites and use “unique, uncrackable passwords.” There’s a link to another post on how to do that. This post notes that it’s not as easy to […]