Vanderbilt University has earned many distinctions, including Princeton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.
There is a common plot line that underlies most of the breach stories in the news. Software written by bad guys gets into places on the corporate network where it shouldn’t be. It looks around, finds vulnerable systems, grabs valuable data and transmits it off the network. The term most commonly used to describe this behavior is Advanced Persistent Threat (APT).
Training videos can be both effective and fun if you have some imagination and are open to a different approach. The safety and security video that Kishwaukee College in Malta, Illinois, recently developed proves that point.
Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.
Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert.
To have a successful security design and installation, it is critical to get all security stakeholders in the same room and to establish requirements and goals early. It is important for those goals to relayed to other members of a design team so that all of the needed support services and integration can be vetted.
If you asked your employees to define “cybersecurity,” what would they say?
July 1, 2014
By screening a provider for these qualities, you’ll accomplish much more than a manager who simply wants to “check the box” and get it over with. You’ll walk away knowing participants are getting the training that’s right for them, not an endless sea of faceless masses.
In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014
Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.
Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.
About 200 banks in New York took part in a cybersecurity “exam” in which they were made to respond in real time to questions about their cybersecurity policies and procedures.
Late last year about 200 banks in New York took part in a cybersecurity “exam” in which they were made to respond in real time to questions about their cybersecurity policies and procedures. The test was designed to help the banks see how they compare with their peers in terms of being ready for attacks by cybergangs looking to break into their networks.