As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
According to the Global Retail Theft Barometer, retail shrink accounted for $107.284 billion in 2010. As retailers begin to determine their goals and initiatives for 2011, they need to consider how to identify and prevent the margin-robbing activities that are cutting into their bottom lines. Here are a few commonly missed fraudulent activities and operational errors, along with some tips on how to combat them.
Two educational tracks at ISC West, April 5-8, 2011 in Las Vegas, will provide information on collaboration between public and private organizations and security for houses of worship.
You can substitute any threat or compliance challenge, for any industry, and come to the same conclusion. With the advent of IP-based security and the widespread use of non-proprietary servers and storage, solving problems through security is no longer simply the domain of the Security group. Because IT has subject matter expertise, and often holds the budget reins, IT now has a head seat at the table.
At most school districts, the word “security” is synonymous with “surveillance.”
It has always been and still is the most popular security technology used in schools. In fact, school video security continues to expand faster than the overall security market.
While arson may be committed by business people, it should not be thought of as a white-collar crime. The reporting of a fire as accidental, when it is known to be arson is a crime. Just one very important point: “Washington law has long recognized the presumption that a fire is accidental, unless proven otherwise,” meaning that the insurance companies have a hill to climb to prove arson.
The use of information technologies (IT) for physical security is a no-brainer. This is likely why Physical Security Information Management (PSIM) has received such attention over the last few years.