Security professionals have their hands full, day in and day out, keeping their organizations safe from threats to personnel, physical assets, or data. To be successful, you need the knowledge and skills to manage your team and coordinate their efforts across a wide range of tasks, such as managing surveillance systems and access controls, monitoring […]
Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.
Back in 2018, Google introduced its Duplex Artificial Intelligence (AI) software that, with the help of Google Assistant, can speak for a user with an AI-based, but human-sounding, voice. The powerful voice assistant was developed to make calls and perform a few services, like making dinner reservations.
HR and security practitioners must fully understand the differences between a threat assessment, an employee assistance program (EAP) referral, an intervention by a psychologist, and a Fitness for Duty (FFD) evaluation, usually done by a psychiatrist. There are significant legal differences, and the approaches and outcomes can lead to different responses while trying to manage […]
The Total Security Summit is a dynamic two-day event specifically targeted at Security Professionals across all sectors. The summit is set up to facilitate focused discussions between you and vendors who will walk you through the latest technologies and innovative solutions to meet your business’s security needs.
The “tactical communications” concept known as Verbal Judo was created by the late George Thompson PhD, the founder of the Verbal Judo Institute, and the author of the 1993 book Verbal Judo: The Gentle Art of Persuasion. His techniques for high-risk conversations when people are angry have been taught to police officers, military members, and […]
Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]
It’s good practice for security executives to work with Human Resources to develop an organization-wide policy regarding how to respond in the event of an active shooter in the workplace. It’s even better to notify every employee in the organization of the policy and conduct regular training on the procedures. But it’s a bad idea […]
Workplace violence is not industry specific and happen to workers in any organizations. With that in mind, the Occupational Safety and Health Review Commission (OSHRC) recently reaffirmed that workplace violence is a recognizable hazard and reminds employers that they are responsible for protecting employees from assaults and homicides.
A key source for online criminals to interject malicious attacks, social media continues to grow and command larger audiences from a diverse group of individuals and businesses. Lurking in the background, scammers are taking advantage of unsuspecting victims in the social media space.