Ok, everyone has heard about The Internet of Things (IoT) and Big Data. So, that on its own is not much of a prediction. But this prediction is about IoT and you.
Aside from dialing 9-1-1 during an emergency, most people are not familiar with how emergency dispatch works. This often also holds true for facility security personnel. Whether a gas leak or armed employee, it is important that enterprise security personnel understand some of the technology and process behind our national emergency number and response system for their own professional purposes. With this in mind, the following should be considered.
There are good ways to handle your contract security officers and bad ways. We break it down here. For CSOs and other purchasers of security services, you first need to define needs and roles.
Healthcare security is changing. As more and more hospitals form or join health systems or implement the Affordable Care Act, the standardization of security officer services has many advantages. The need for greater value from service providers, more efficient programs, consistent protocols for staff and patients and an increasing focus on both safety and security are positioning standardization of security services as a critical solution for health systems.
Approximately 11,370 healthcare and social assistance workers were the victims of workplace violence assaults in 2010 – a 13-percent increase over such assaults in 2009, and many more incidents likely go unreported, according to the Bureau of Labor Statistics.
The 21st Century is often referred to as the information age; the developing global marketplace has contributed to the entrance of new cultures and economies into the competitive global economy. Due to globally available infrastructure and the development of global telecommunication/computing capabilities, it has enabled individuals, companies and countries to compete globally on a level playing field with traditional Western powers even from some of the most remote parts of the world. Unfortunately this has also created conditions in which the threat of corporate espionage has been rapidly proliferating due to the ease threat actors can ply their trade both through physical and virtual actions against U.S. corporations.