BYOD is a growing sensation in the business world, but the trend often leaves security as an afterthought. Three BYOD experts share their advice and experience on how mobile workers, home offices and BYOD can improve business while still managing data security.
Manual processes are the weakest link in an automated system. As corporations strive to be more lean and efficient, employees are often tasked with extra duties and stresses that can aggravate the problem.
Hurricane Sandy made landfall in New Jersey on October 29, 2012, crashing against the coastline of New Jersey before barreling into New York City and most of the upper East coast.
Port Newark Container Terminal (PNCT) is now operating off of a wireless mesh network to provide around-the-clock surveillance on the 180 acres of port property.
Organized retail crime (ORC), already a large national problem, continues to grow rapidly. According to the FBI, the losses attributed to organized retail crime are in the tens of billions of dollars each year.
Pay-at-the-pump card skimming attacks are a growing concern. Despite press coverage and education efforts, skimming incidents continue unabated, according to BankInfoSecurity.com.
Mac’s Convenience Stores has joined Circle K, owned by Alimentation Couche-Tard, in using social media to identify thieves, according to a Net News Ledger report from Thunder Bay, Ontario.
While branch bank security is somewhat cookie-cutter, designs for protection at the major business offices of financial institutions have moved to more sophisticated, integrated needs.
With the establishment of the federal Chemical Facility Anti-Terrorism Standards (CFATS) regulations, security is a matter of regulatory compliance for the chemical industry in the United States for the first time in history.