Security breaches can cost organizations millions of dollars, and those costs could be followed by lawsuits, insurance claims, and hefty fines. Just as important are the devastating effects on company reputation and customer trust that could extend far into the future. A 2008 study by the Ponemon Institute, which researches information security policy and data protection, found that after a breach of credit card data businesses lose 31% of their customers.
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
Today, security is of utmost importance at the nation’s colleges and universities. Events such as the Virginia Tech shooting in 2007 remind administrators, parents and students of the stark reality that considering the safety of all individuals who visit, work or attend classes at college campuses is essential.
Outside of the classrooms and general sessions, the ASIS 2011 exhibit floor will be abuzz with activity around some of the most innovative security products and services the industry has to offer. The challenge for many will be in navigating the more than 700 exhibits across 230,000+ square feet to find the best solutions.
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
There are a number of aspects of 'conventional wisdom' in the realm of physical security that just don't add up, that smack of having their origins in "the salesman made me do it," which under close scrutiny turn out to be absolutely backwards or even dangerous.
Remember back when we were kids and heard the fire alarm bell in school? On cue, we lined up in an orderly manner and dutifully marched out of the classroom single file, no talking, and keep your hands to yourself. The super loud fire alarm bell and the discipline of the fire drill was all that we needed to know to be safe. How times have changed!
When it comes to preventing the loss and theft of mobile assets within the enterprise, there is no one-stop-shop security solution. However, the need has never been greater as mobile devices become more prevalent and hold more sensitive data.
Multi-building campuses such as universities, research facilities, convention centers, hospitals and others face unique problems in implementing a total physical security solution.
The Santa Clara Valley Transportation Authority in California provides public transportation for more than 140,000 passengers a day. The VTA has approximately 1,700 employees supporting three bus divisions and a light rail division. The transportation system consists of about 600 low-floor buses that service 326 square miles of urbanized area daily and a light rail system which operates more than 100 low-floor light rail vehicles across 42.2 miles of rail.