The Week in Review 5/26/12-6/1/12
What were the top articles this week? Catch up with your peers and get involved in the conversation!
Check out this little preview of each of this week’s top 10 articles:
Using Crime Data to Drive and Defend Security Resource Allocations: The most enduring theory of W. Edwards Deming – one of the business world’s most respected authorities on organizational theory – was that unless an activity is measured, it cannot be properly managed. Dr. Deming believed that all decision-making must be driven by reliable data, and this once revolutionary concept is now accepted as a fundamental management practice at most corporations around the globe.
Beyond the Numbers: What the Stanley-Niscayah M&A Means for You: When security integrator Stanley Security Solutions announced plans last year to purchase fellow security integrator Niscayah, one of the largest global security firms in Europe and the U.S., for $1.2 billion, the move shook the very core of the security integrator space. The acquisition was large, to say the least: with it, Stanley Security Solutions increases its global presence, and its North American team greatly increased. There are more installation technicians, service specialists, branch employees, supervisors and team leaders. It created a much larger business, growing 30 percent in overall U.S. associates since January 2011.
DHS Releases List of Monitored Online Keywords: The list of keywords and phrases monitored to determine threats against the U.S. includes the obvious choices – “attack,” “Al Qaeda,” “terrorism” and “dirty bomb.” But some more ambiguous search words were also mentioned, such as “pork,” “cloud,” “team” and “Mexico,” the article says.
Trail Mix: Five Good Ways to Track People: People tracking, overcoming its sometimes Peeping Tom, Big Brother image, boasts both long existing and on-horizon applications that have business benefits, increasing the level of security while also, many times, saving lives.
The Most Influential People in Security – 2011: Each year, Security magazine honors top security executives who positively affect the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and the general public.
Check in with us on August 1 to see who made the list for The Most Influential People in Security – 2012.
Protecting Against the Thieves Within: How to Implement an Effective Fraud Prevention Program: Research conducted by the Association of Certified Fraud Examiners (ACFE) shows that the typical organization loses an estimated 5 percent of its revenues to fraud each year, and more than 85 percent of all occupational fraud cases involve employee theft. The threat of fraud and embezzlement is not only significant; it is universal. Put simply, any company that employs individuals is at risk of losing assets to employee theft.
The Top 10 Open Video Management Systems: In the video surveillance market today there is a plethora of Video Management Systems (VMS). Some are unique that serve very niche markets, while others are the dominate players or market leaders, and in between are the up and coming systems that are challenging the market leaders. In all of these solutions there is one principle: to provide a tool that aids the security professional in the efficient and effective use of surveillance equipment.
Security’s Top 25 People in the Security Industry: Many here speak of the security industry in general, including how to adapt to the changing face of security. But this year, the security industry has experienced blows that call attention to an area that is in desperate need of security beefing up: education and campus security
Multi-Layer Defenses Protect Perimeters: On March 1 of this year, Kenneth Mazik barreled his SUV through a security fence at the Philadelphia Airport and drove onto the runway. Aircraft controllers were given only seconds to divert an incoming commercial jet before collision with the rogue vehicle. Fortunately, airport police and security were well prepared to deal with the incident; as Philadelphia Police Chief Inspector Joseph Sullivan reported on ABC News: “The ground radar kicked in; the tower was alerted immediately and they made sure to divert flights coming in and then quickly shut the airport down.”
SECURITY’s Top Guarding Companies: The guarding business is strong and growing, with firms providing a diversity of services. The top six firms surveyed by SECURITY magazine employ about 19 percent of the total security guards in the United States. And guarding companies say that, on average, hours billed increased by 20 percent in 2002 compared to 2001.
Other top news this week includes:
On the Track of OSAC: The Country Council Chronicles, London: By John McClurg
Flame Virus Was Built for Cyber Espionage, Experts Say
ASIS Receives ANSI Approval for Physical Asset Protection Standard
Flame Virus Stirs Up Concern in UN
Was your favorite article not listed? Share it with us in the comments section, post it to your preferred social media site, or email me with your notes at meyerc@bnpmedia.com. I look forward to hearing from you!