Archives

What’s the Deal with the Krack Attack?

Recently, you may have heard about the “Krack” Wi-Fi vulnerability that has the potential to affect literally every connected device on the planet. What really is Krack? Could it affect your business operations? If so, what should you do about it?

Print

Avoiding Bias When Hiring Security Officers

The challenge for the security guard industry has always been: How do we hire the best and the brightest, even though we can’t pay them as much as we need to? How do we attract qualified people? Security officer firms that need to hire a lot of guards to staff a new or expanding contract […]

Print

Handling Disruptive People in Public Spaces

Certain facilities have an “invitee relationship” with the public, and they actively encourage people to use their hotels, bars, restaurants, movie theaters, or nightclubs. Beyond just the hospitality industries, other public facilities include hospitals and medical clinics, stores and malls, churches, libraries, and parks. Security managers and their officers need to know how to use […]

Print

Getting Back to Facility Security Basics

In this era of mass attacks, cyberattacks, hacking, and the challenge of providing necessary security improvements without breaking the budget, it can help to prioritize your must-haves. This requires thinking beyond the usual (and expensive) security approach of “more guards, gates, fences, cameras, and lights.”

Print

Keeping Security Relevant in a Shared-Use Facility

How do you install new security devices or systems in a building you don’t own or operate? How do you get the landlord’s buy-in to make important changes to your part of the building? How do you keep your employees safe in a facility with multiple access control points and a shared lobby or reception […]

Print

Identifying Weak Points in Your Access Controls

When it comes to security systems, policies and procedures, and equipment, we tend to take for granted what works right up until it fails. It’s critical to continue testing, evaluating, and event-stressing the systems we have in place to protect employees, clients, customers, company assets, and the entire scope of the property.

Print

Preventing Social Engineering Hacks

Cyberattackers often try to gain entry to critical IT systems through the various electronic entry points and backdoors left by the programmers who created them. Some hackers take the human approach, which can be much simpler, and attempt to get password and network access information by calling employees directly and impersonating their IT colleagues.

Print

Keeping Mail and Packages Safe Inside the Facility

It’s easy to get complacent about how U.S. Postal Service (USPS) mail and packages from various delivery companies come into a facility. The process of how these items are collected, screened, sorted, and delivered can become routine until there is a problem, hazard, or something dangerous is discovered.

Print