Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who are able to accomplish their work at home. This hybrid workforce is expected to become more prevalent as 75% of workers want to retain flexibility over their schedule beyond the pandemic. To get some insight into how security executives executives can implement consistent security practices for the new hybrid workforce environment, we spoke to Michael Borromeo, Vice President, Data Protection at Stericycle, the provider of Shred-it information security services.
The new year is upon us, and as such, it is a time to reflect on what worked over the past 12 months, and more importantly, what didn’t work. Organizations all over the world are utilizing applications, operating systems, and IoT devices while their data, and their customer’s data, increasingly lives in the cloud. Organizations should take the beginning of the year as a housekeeping opportunity to assess their systems to set themselves up for success in the new year.
American Security Drone Act of 2021 The American Security Drone Act of 2021, formerly introduced as the American Security Drone Act of 2019, was given new life in January 2021 with bipartisan support and now incorporates drone detection and mitigation systems, not just drones. Here are five questions you can ask RF-based technology vendors to determine if they are in compliance with the federal advisory or could be banned by the American Security Drone Act of 2021 for security and cybersecurity reasons.
Being responsible for making the right decision on your entrance solution can be a challenge. Not only is it a considerable initial financial investment, but also you are responsible for the safety and customer experience of the building occupants themselves.
So, all that being said, what do most security professionals consider the essentials for selection and installation of a security entrance? In this article we will discuss the top seven factors to consider when investing in a security entrance solution.
Though many of us in the security industry are well-versed in the value of emergency mass notification technology, we have entered what is arguably this sector’s most significant era, as it plays a central role in the largest public health initiative in modern times. Now more than ever, organizations need to take a closer look at their critical communications practices to ensure they foster operational resilience and efficiency.
The risks that come with having an ineffective lockdown plan became painfully evident following the events at the U.S. Capitol building on Jan. 6. While the people inside the building were ushered to safety, the building itself was breached and overrun resulting in theft, building damage, injury and even death. It was clear that while the notification side of an emergency plan can be useful, its effectiveness only goes so far if it is not working in tandem with other physical security measures.
We asked several Women Security Leaders to tell us what drew them into the profession, along with their thoughts on continued diversification of the industry.
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s most valued assets. Or, put in simpler terms, the more closely an employee works with a company’s crown jewels, the more essential it is to virtually eliminate the possibility of an endpoint security breach.
GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.
In order to combat cybersecurity threats, the Biden administration and state governors across the country should immediately work to foster deeper relationships with the private sector. Tech and government certainly don’t always get along, but the threats we face now require a national effort that would rival the Space Race of the 1960s. This can be done through state and federal governments offering financial incentives to businesses that prioritize the development and integration of cybersecurity measures, amplified communication from the government concerning the importance of cybersecurity, as well as the potential bolstering of compliance standards to minimize threats and the negative impact of breaches.