Archives: July, 2018

Doug Bedell — July 31, 2018, 11:17 am

Insiders Can Be Vexing Security Threats

Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards. “The key to dealing with insider threats,” Vijayan writes, “is to keep […]

Doug Bedell — July 25, 2018, 9:49 am

Covert Operations Can Even Be Funny, Says Protection Circle

“On the scene” at cloak and dagger covert operations: Protection Circle provides “Stories from the Field” so you can get a sense of what’s involved in conducting covert operations. Why would you want to know? Because they’re not just “cool”. Covert operations require knowledgeable planning and execution. But “once the operation is running properly, there […]

Doug Bedell — July 24, 2018, 12:23 pm

Hiring Contract Security Guards May Be Cost-Effective

SecurityInfoWatch offers a primer on hiring security guards from contract providers. “You must pay the firm for its services,” the advisory reads, “on top of paying for the cost of wages, training, projected overtime, vacation accrual, payroll taxes, uniforms, benefits, and other specified or mutually agreed upon services.” Even so, “The cost of hiring a […]

Doug Bedell — July 20, 2018, 11:03 am

‘Stories From the Field’ On Covert Operations

For a change of pace, Protection Circle offers some “stories from the field” on how covert security operations can be difficult, risky, expensive, or just funny, to manage. Such as, “…a production company client from Los Angeles that wanted a certain celebrity who was attending an event in San Francisco to receive covert protection. This, […]

Doug Bedell — July 18, 2018, 4:53 pm

DHS Issues a School Safety Guide Prepared by the Secret Service

For any of our readers who may be active in school governance, or simply have children in school, here’s a reaction from the Department of Homeland Security to the two school shootings this year, and the others before them. A new DHS guide is entitled, “Enhancing School Safety Using a Threat Assessment Model: An Operational […]

Doug Bedell — July 16, 2018, 12:30 pm

Cybersecurity Breaches in 2018 – ‘So Far’

Following up on Briefs’ last post on cyber crime, here, from Wired magazine, are “The Worst Cybersecurity Breaches of 2018 So Far”. Wired’s warning: “Corporate security isn’t getting better fast enough, critical infrastructure security hangs in the balance, and state-backed hackers from around the world are getting bolder and more sophisticated.” The examples range from […]

Doug Bedell — July 13, 2018, 11:15 pm

Cyber Crime: A Gas Pump Acting ‘On Its Own’

Barrier Briefs has been noting how cyber-based crime is increasing, along with the need for security vigilance. Here’s an example, provided by Bruce Schneier on his security blog. “Police in Detroit,” Schneier writes, “are looking for two suspects who allegedly managed to hack a gas pump and steal over 600 gallons of gasoline, valued at […]

Doug Bedell — July 11, 2018, 1:31 pm

Digital Insiders Can Be As Disruptive As Outsiders

Perish the thought, but the reality is that security disruptions – digital disasters – can be caused by insiders in an organization as well as faceless hackers. As proof, discusses “The 6 Worst Insider Attacks of 2018 – So Far” in which “stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the […]

Doug Bedell — July 9, 2018, 11:13 am

U.S. Cybersecurity Effectiveness Questioned By An Observer

Don’t count on the Department of Homeland Security to insure protection against cyber-attacks on U.S. businesses and government agencies, the Homeland 411 blog advises. “Chronic under staffing, insufficient resources, and a lack of cyber-prioritization has left government systems and critical infrastructure vulnerable to attacks and has placed DHS’s cyber goals far from reach, according to […]

Doug Bedell — July 5, 2018, 2:25 pm

No Doubting It: Enterprises Need a Cybersecurity Plan

Computer hackers with access – granted or created – to a business file can do great harm to the business involved. A security truism these days? Of course. But Joe Granitto on Security InfoWatch follows up with practical suggestions on protecting your data. “Defending your operations and reputation,” he writes, “requires a holistic cybersecurity plan, […]