Latest Articles

Small and Cheap ‘Raspberry Pi’ Microcomputer Can Play Many Security Roles

As security technology gets smaller, faster, more accessible, and more powerful, it can also get more expensive. Budget-conscious security professionals must balance what needs to be protected with what they can afford, all with a need to be practical. We don’t put paperclips in a wall safe, but we can often outthink ourselves, believing that […]

Best Practices for Successful Surveillance Operations

Surveillance operations may be required by security practitioners, private investigators, or corporate security investigators. These field activities may be need to prove employee theft or fraud, workers’ compensation fraud, or even to stop a potential workplace violence attack. Successful surveillance requires preparation.

Security Podcaster Blazes the Trail for Information, Awareness

Chuck Harold’s career took him from law enforcement to the security industry, and he now works as a security consultant and pioneering podcaster. He hosts his national “Security Guy Radio” podcast every Monday at 7:00 p.m. Pacific time. Harold has recorded over 600 episodes, and his guests have included a wide range of security experts […]

Popular Articles

The Challenge of New Federal OSHA Guidelines for Workplace Violence Prevention

The federal Occupational Safety and Health Administration (OSHA) has created new guidelines for workplace violence prevention, measurement, and response. Its purpose is to help organizations address when a workplace violence perpetrator violates OSHA’s well-known General Duty Clause (GDC), which says employees must protect their employees from all types of physical harm.

Is There a Value to Professional Security Certifications?

The security world is full of professional certifications, ranging from the plethora of initials offered by ASIS, to homeland security designations, to a fraud examiner’s certification, to others related to crisis management, threat management, and even critical incident stress. Do the examination costs, recertification fees and costs, and study time make sense for security professionals […]

New TSA Travel Rules May Put Stress on U.S. Travelers Returning from Overseas

Recent changes and pending new ones in travel restrictions for airline passengers coming from certain Middle East countries have banned the possession of laptop computers inside the cabin of the plane. More changes may be forthcoming, including adding 71 additional international airports to the current list.

Ohio School District Allows Teachers, Staff to Be Armed

In what is a growing trend in some school districts across the United States, the school board for the Georgetown Village School District in Georgetown, Ohio, voted to allow its teachers and staff to be armed at work. All staff members who want to participate in this program will go through a 3-day firearms certification […]

Employee handbook on a wooden table and glasses.

Employee Handbooks: The Vital Link in a Cybersecurity Chain

By Eduard Goodman, chief privacy officer for IDT911 When it comes to cybersecurity, two factors are coming together in a worrying way. One lurks in the results of a survey, conducted by the Association of Corporate Counsel, that shows employee error is the leading cause of data breaches. The other was revealed in research carried […]