For business owners and property managers, public building security remains a universal challenge: How do you ensure the security of your staff and customers during hours of operation and protect your assets once regular business hours end? The conundrum that is security and safety in public spaces seems eternal, and the violence that fuels today’s headlines only exacerbates the urgency to find solutions to securing common building entrances.
When an incident or disaster occurs, security and fraud investigators go to work. They must be able to rely on innovative processes and tools that allow them to swiftly locate and analyze the information needed to determine the proper resolution or action. Credit unions need intuitive solutions that can be leveraged across multiple departments in a moment's notice to be more efficient and effective in today’s challenging environment.
The massive, overnight shift to a fully remote work environment during the COVID-19 crisis has amplified both the urgency and the obstacles around endpoint security. Not only were many machines not designed to work outside the corporate environment, leaving many companies woefully unprepared, but cybercriminals have already sprung to the occasion, preying on COVID-19 fears.
Leonard Moss Jr. has been named chief security officer and head of the Security Services Department at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Md.
ASIS International announced that it is exploring options for Global Security Exchange (GSX) 2020, scheduled to take place 21‐23 September in Atlanta, Ga.
Like many other industry buzzwords, there’s a lot of hype around security automation. Yet, for the first line of defense in an enterprise environment, the analysts working in the security operations center (SOC), the notion of automation is more headline than reality. Many basic tasks – logging, fault isolation, reporting, and incident troubleshooting – are still very much manual.
The best way to protect accounts and data from credential stuffing and online phishing attacks is to stop reusing the same passwords on multiple accounts. All accounts—but especially accounts related to work, retail, finance, and government—should be protected with strong, unique passwords. What are a few best practices to ensure employees are safer online?
Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to evolve.
Testing for illegal drugs is an ongoing battle. To mitigate the opioid pandemic, rapid detection and identification of illegal drugs is critical for campus safety, police officer and criminal investigators.