Archives

Businessman using laptop with smartphone and tablet beside cappuccino

Security Resources You Should Check Out

Security professionals have their hands full, day in and day out, keeping their organizations safe from threats to personnel, physical assets, or data. To be successful, you need the knowledge and skills to manage your team and coordinate their efforts across a wide range of tasks, such as managing surveillance systems and access controls, monitoring […]

BYOD

Adapt BYOD Policy to Account for Tech and Culture Change

Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.

How to Use Fitness-for-Duty Evaluations for Workplace Violence Threats

HR and security practitioners must fully understand the differences between a threat assessment, an employee assistance program (EAP) referral, an intervention by a psychologist, and a Fitness for Duty (FFD) evaluation, usually done by a psychiatrist. There are significant legal differences, and the approaches and outcomes can lead to different responses while trying to manage […]

Diverse IT Team

Get the Edge You Need at the Total Security Summit!

The Total Security Summit is a dynamic two-day event specifically targeted at Security Professionals across all sectors. The summit is set up to facilitate focused discussions between you and vendors who will walk you through the latest technologies and innovative solutions to meet your business’s security needs.

Verbal Judo Techniques for Security Officers

The “tactical communications” concept known as Verbal Judo was created by the late George Thompson PhD, the founder of the Verbal Judo Institute, and the author of the 1993 book Verbal Judo: The Gentle Art of Persuasion. His techniques for high-risk conversations when people are angry have been taught to police officers, military members, and […]

3D rendering Central Computer Processors CPU concept. Electronic engineer of computer technology. Computer board chip circuit cpu core. Hardware concept electronic device motherboard semiconductor

Non-Malware Attacks: What They Are and How to Protect Against Them?

Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]

Tabletop active shooter training

Chicago Incident (Among Others) Exemplifies the Wrong Way to Do Active Shooter Drills

It’s good practice for security executives to work with Human Resources to develop an organization-wide policy regarding how to respond in the event of an active shooter in the workplace. It’s even better to notify every employee in the organization of the policy and conduct regular training on the procedures. But it’s a bad idea […]

How Businesses Can Manage Security Risks from Social Media

A key source for online criminals to interject malicious attacks, social media continues to grow and command larger audiences from a diverse group of individuals and businesses. Lurking in the background, scammers are taking advantage of unsuspecting victims in the social media space.