Cyberattackers often try to gain entry to critical IT systems through the various electronic entry points and backdoors left by the programmers who created them. Some hackers take the human approach, which can be much simpler, and attempt to get password and network access information by calling employees directly and impersonating their IT colleagues.
Security professionals in health care are relied upon to both mitigate and manage huge complexes and remote facilities. The need to balance and maintain a welcoming environment, while protecting the people and assets within these healthcare facilities is a monumental task.
In an increasingly perilous web environment, server-level security is an imperative. Your server and IT infrastructure are vulnerable to numerous threats on the web, and thus, comprehensive security is a must.
The intricate interrelationship between physical, IT, and cybersecurity is sometimes hard to differentiate. As convergence brings physical security and logical information network processes together, the lines are becoming even more blurred in regard to what role security personnel plays in an organization.
The orientation process for new employees can be like drinking from a fire hose, with a lot of information—and not all of it completely relevant for them—in a short period. The Security department may play a large or small role in this discussion, and it’s critical that the presenters provide consistent, useful information that the […]
Physical security and logical information networks within organizations have traditionally been completely separate, but a new form of cybersecurity and physical security convergence has started to emerge over the past few years. Has the convergence movement taken hold as a corporate culture?
The attack surface that security professionals must defend grows exponentially as more and more of our workplaces and processes are automated. This is especially true in industrial settings, where a host of machinery engages in a tightly coordinated dance, directed through instructions sent over wired or wireless networks. The price for a security breach is […]
Factories and warehouses make frequent use of safety notifications, awards, and contests to encourage and reward the employees who prevent accidents and injuries. Security departments in organizations can initiate the same process, to reward all employees who follow security policies and report problems or deficiencies.
It’s all too easy for many employees to consider workplace security as someone else’s job. They often assume the responsibility lies with management, security staff, surveillance cameras, the IT department, or the police. That can be true to an extent, but for security to really be effective, everyone at the company must be involved.
Janitorial crews are often neither seen nor heard, starting their work shifts after most employees have gone home. This level of freedom can cause security problems related to more than just incidents of theft. Workers in these jobs tend to be poorly screened or not backgrounded by the firms who hire them, mostly because the […]