Enterprise card solutions can enable myriad business applications. One example: Identity cards allow Italians to share and use publicly available bicycles.In enterprise-wide identification card access systems, which came first –
Like the requirement to review technological needs against current and future applications, so must companies review and assess current training methodologies and objectives in addressing Workplace Violence Prevention and Security Awareness.
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Card access control, especially newer multi-functional approaches, can do more than secure a door or provide entry to a parking garage. Today, a card, sometimes branded to the issuing organization,
Country Joe McDonald sung his question about war in the 1960s: “It’s 1-2-3, what are we fighting for?” Well, besides freedom and survival and dispatching evil, often one outcome of
Remember the term “going postal”? It originated in August 1986, when post office employee Patrick Henry Sherrill in Edmund, Okla. shot two of his supervisors and then killed 14 other co-workers and injured several others. He then turned the gun on himself and committed suicide.
How do you measure leadership success? Certainly, you can look down the chain and see whether your function and your team are accomplishing their objectives. You can usually tell if your staff is motivated and if they’re eager to follow you. But strong leadership isn’t just about how you relate to the people below you on the reporting ladder. It’s also about how you relate to those above.
The infamous border between southwest U.S. and Mexico. G4S security personnel are working with U.S. Customs and Border Protection to help secure it. The city of Vancouver partnered with a private
How does John Imhoff, director, Office of Firm Security for Ernst & Young, sell his security ideas to the C suite? “By communicating security’s value…and establishing a routine that creates the expectation of essential information on a regular basis.”
Against all odds, a pair of White House party crashers in November 2009 made their way effortlessly into a state dinner hosted by the President. By all accounts, this breach