With the growing visibility around cyber breaches, there is now a heightened sensitivity among corporate boards and executive teams as they become more engaged in the management of cyber risk, and its ability to impact their business and personal indemnity.
The topic of gun control was not a foreign subject to our classrooms, but never once did we believe our school would become the epicenter of this debate. Yet, as we grieve our fallen classmates and staff members, politicians address this as “another mass shooting” and entertain the idea of arming teachers.
How would you feel if a thief rang your doorbell at home and said, “I want you to help me burglarize your home?” How would feel if a crook knocked on your door and said, “Will you look the other way while I steal your car and your kids’ bikes and rip out some of your shrubs?”
A key factor in establishing trust is the presence of a Security Operations Center (SOC). The SOC is charged with monitoring and protecting many assets, such as intellectual property, personnel data, business systems and brand integrity.
IT security leaders are calling for an end to the complex password. They foresee biometrics, dual-factor authentication and eventually a new “whole person” approach to identity as being among the not-too-distant remedies for password malaise.
With the recent tragedies that have occurred on campuses as a result of domestic violence, now is a good time for schools to evaluate or re-evaluate their institution’s readiness and response capabilities to threats and incidents of domestic violence.
Security professionals are tasked with addressing reputational risk as well as physical risk, but are our own departments and industry doing enough to avoid being a risk to the enterprise as a whole? It’s time to take a good, hard look at your workplace and ask if it is inclusive, supportive and fair.
In today’s world, the Internet of Things (IoT) is ubiquitous and holds great potential, but also brings security concerns. While IoT devices are being used across industries, the healthcare industry’s experiences with insecure devices provide valuable lessons to heed.