Tuesday, 31 October 2017

Study Finds 3M Americans Carry a Loaded Handgun Daily

Approximately 9 million handgun owners in the United States carry loaded handguns on a monthly basis—about 7 million of whom have concealed carry permits—while 3 million report carrying on a daily basis.



source https://www.securitymagazine.com/articles/88455-study-finds-3m-americans-carry-a-loaded-handgun-daily

Intelligent cameras for extreme conditions

Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40C to +65C. Even the built-in Intelligent Video Analytics technology is tough enough to provide maximum situational awareness, even in the most demanding environments.

source https://www.securitymagazine.com/articles/88454-intelligent-cameras-for-extreme-conditions

Raising the Bar for Small Business Security

Following a recent move to a larger retail storefront and taproom, The Beer Cellar realized a need for a stronger video security system compared to the previous analog solution in place at its initial location.

source https://www.securitymagazine.com/articles/88443-raising-the-bar-for-small-business-security

Drone Security Risks and How to Protect Against Them

Commercial use of drones for tasks like surveillance and aerial photography/videography creates business efficiencies and new opportunities, but it’s important to understand drones’ inherent security risks and their potential impact on a company.

source https://www.securitymagazine.com/articles/88462-drone-security-risks-and-how-to-protect-against-them

Video Surveillance by Design

Years ago, installing a new surveillance system often meant finding a comfortable trade-off between improved security and the amount of hardware you were willing to look at on a daily basis.

source https://www.securitymagazine.com/articles/88459-video-surveillance-by-design

Phishing: The Scary Clown of Cybersecurity

Much like the It (the clown), phishing goes by many names, has become much more adept at preying on the hopes and fears of individuals, and is growing rapidly as criminals learn which techniques are most effective.

source https://www.securitymagazine.com/articles/88458-phishing-the-scary-clown-of-cybersecurity

How to Evaluate Your Access Control Provider’s Customer Service

The critical nature of access control and other security products and systems makes it extremely important to select a vendor who delivers strong customer service and satisfaction, helping you create a secure enterprise and better mitigate security risks. Here are a few tips on how to best evaluate your future access control provider.

source https://www.securitymagazine.com/articles/88457-how-to-evaluate-your-access-control-providers-customer-service

What’s Changed in Open-Air Venue Security?

Following the Las Vegas shooting – the deadliest shooting in modern U.S. history – new concerns emerge regarding the security programs required to protect fans, performers, and staff at open-air sports and entertainment venues.

source https://www.securitymagazine.com/articles/88461-whats-changed-in-open-air-venue-security

Almost Half of Businesses Have Plans to Outsource IT Security

A new survey has found that four out of every five businesses across the US and UK will change how they deal with security in the coming 12 months.



source https://www.securitymagazine.com/articles/88460-almost-half-of-businesses-have-plans-to-outsource-it-security

NYC Passes Bill to Guarantee Paid Leave for Domestic Violence Victims

New York City lawmakers passed legislation that will require employers to allow people to use their paid time off for issues relating to sexual abuse, domestic violence, stalking, and human trafficking.

 



source https://www.securitymagazine.com/articles/88456-nyc-passes-bill-to-guarantee-paid-leave-for-domestic-violence-victims

Sunday, 29 October 2017

CompTIA Updates its Security+ Certification Exam

CompTIA has updated its CompTIA Security+ certification exam to reflect the changing and expanding responsibilities of cybersecurity professionals.



source https://www.securitymagazine.com/articles/88453-comptia-updates-its-security-certification-exam

New Report Says Smart Cities Mean Safer, More Accessible Communities

With the Internet of Things (IoT) as a foundation, technologies such as automated street lighting, smart energy meters, parking assistance apps and sensors have ability to make cities safer and more accessible, says a new report from the Consumer Technology Association (CTA).



source https://www.securitymagazine.com/articles/88452-new-report-says-smart-cities-mean-safer-more-accessible-communities

E-Commerce Fraud Loss Reaches $57.8 Billion

Account Takeover has replaced Stolen Financials as the fastest growing fraud threat for eCommerce websites in 2017.



source https://www.securitymagazine.com/articles/88451-e-commerce-fraud-loss-reaches-578-billion

Recovery Plans are Vital Following Active Shooter Incidents

A new study offers a four-phase approach for businesses to use following a violent incident.



source https://www.securitymagazine.com/articles/88449-recovery-plans-are-vital-following-active-shooter-incidents

Friday, 27 October 2017

A Guide to Effective Network Penetration Testing

Do you want to discover vulnerabilities before a hacker exploits them? Are you already aware of network vulnerabilities, but need an authority to testify that your network security needs additional investments?



source https://www.securitymagazine.com/articles/88447-a-guide-to-effective-network-penetration-testing

Climate Central Ranks US Cities Most Vulnerable to Coastal Floods

Climate Central, a nonprofit news organization that analyzes and reports on climate science, has ranked the U.S. cities most vulnerable to major coastal floods.



source https://www.securitymagazine.com/articles/88446-climate-central-ranks-us-cities-most-vulnerable-to-coastal-floods

Thursday, 26 October 2017

Wednesday, 25 October 2017

OSAC Annual Briefing Changes Location

The annual information-sharing event will take place in Arlington, VA, instead of at the State Department. The dates for the event, November 14-16, have not changed. 



source https://www.securitymagazine.com/articles/88442-osac-annual-briefing-changes-location

Tuesday, 24 October 2017

House Passes Legislation to Increase Cuban Airport Security

The House of Representatives voted to pass Rep. John Katko's legislation to find security gaps at Cuban airports that have commercial flights to the US.



source https://www.securitymagazine.com/articles/88431-house-passes-legislation-to-increase-cuban-airport-security

Virtual Reality and Immersive Technology are Game Changers for Cybersecurity Job Growth

New research shows that millennials/post-millennials are more likely to embrace a cybersecurity career with rich interfaces and VA/AR technologies.



source https://www.securitymagazine.com/articles/88430-virtual-reality-and-immersive-technology-are-game-changers-for-cybersecurity-job-growth

Fifth Annual Study Finds Young Adults' Interest in Cybersecurity Careers Stagnant

An annual survey commissioned by Raytheon Intelligence, Information and Services, Forcepoint and the National Cyber Security Alliance (NCSA) revealed that despite increased awareness of what a career in cybersecurity might look like, millennials remain unprepared for and uninterested in pursuing a career in the field.



source https://www.securitymagazine.com/articles/88429-fifth-annual-study-finds-young-adults-interest-in-cybersecurity-careers-stagnant

US Justice Department Funds Active Shooter Training Program

The U.S. Department of Justice announced nearly $9 million in funding for community policing and for training to help improve law enforcement officers’ response to active shooting situations.



source https://www.securitymagazine.com/articles/88428-us-justice-department-funds-active-shooter-training-program

Support for Stricter Gun Laws Increases in U.S.

A new Gallup poll reveals six in 10 U.S. adults now support stricter laws covering the sale of firearms, up from 55% last year and the highest percentage since 2004.



source https://www.securitymagazine.com/articles/88424-support-for-stricter-gun-laws-increases-in-us

Sunday, 22 October 2017

Friday, 20 October 2017

Gov. McAuliffe Announces $6.1 Million in Homeland Security Grant Awards

Virginia Governor Terry McAuliffe announced the allocation of more than $6.1 million of federal grant programs to enhance emergency preparedness and security throughout the Commonwealth.



source https://www.securitymagazine.com/articles/88409-gov-mcauliffe-announces-61-million-in-homeland-security-grant-awards

Thursday, 19 October 2017

Roland Cloutier Receives FAIR Business Innovation Award

Roland Cloutier, Senior Vice President and Chief Security Officer at ADP, has received the FAIR Business Innovation Award.



source https://www.securitymagazine.com/articles/88408-roland-cloutier-receives-fair-business-innovation-award

$15B Worth of Natural Disasters in US Have Occurred Through September

There were 12 billion dollar weather disasters that have occurred during the first half of 2017, and hurricane season brought three storms that resulted in massive damage, including Harvey, Irma and Maria.



source https://www.securitymagazine.com/articles/88407-15b-worth-of-natural-disasters-in-us-have-occurred-through-september

Spokane Schools SROs Want Guns

Some campus resource officers in Spokane, WA, are asking the school district to train and arm them with guns.



source https://www.securitymagazine.com/articles/88405-spokane-schools-sros-want-guns

House Approves the NIST Small Business Cybersecurity Act

The US House of Representatives passed a bill that would provide cybersecurity guidance to the nation’s small businesses.



source https://www.securitymagazine.com/articles/88404-house-approves-the-nist-small-business-cybersecurity-act

Tuesday, 17 October 2017

Shedding Light on Infrared Camera Technology

Security is an around-the-clock job that doesn’t end just because the sun goes down. Many organizations, especially those in commercial industrial sectors such as airports, warehouses or critical infrastructure facilities, require advanced tools to provide perimeter security or monitor buildings and other assets after dark.

source https://www.securitymagazine.com/articles/88400-shedding-light-on-infrared-camera-technology

How the Right PSIM Can Take Security Careers from the Basement to the Boardroom

Not too long ago, security operations centers (SOCs) and the enterprise security executives and the staff who ran them were relegated to airless basement offices with little security equipment that did no more than monitor video and manage guards.

source https://www.securitymagazine.com/articles/88402-how-the-right-psim-can-take-security-careers-from-the-basement-to-the-boardroom

Crafting a “Yes, But” Travel Security Program

Instead of saying "no" to enterprise travel requests, deploy a little thought and creativity to find "yes, but" solutions to almost any travel situation.

source https://www.securitymagazine.com/articles/88401-crafting-a-yes-but-travel-security-program

California Governor Signs Legislation Preventing Teachers from Shooting if Attacked

California Gov. Jerry Brown signed a bill that says that teachers cannot shoot back if they come under attack at school.



source https://www.securitymagazine.com/articles/88399-california-governor-signs-legislation-ensuring-teachers-cant-shoot-back-if-attacked

Monday, 16 October 2017

18 Senators Introduce ‘Keep Americans Safe Act’ in Wake of Las Vegas Shooting

U.S. Senator Bob Menendez (D-N.J.) was joined by 18 Senate colleagues in introducing the Keep Americans Safe Act, legislation banning the importation, sale, manufacture, transfer, or possession of gun magazines that hold more than 10 rounds of ammunition and are designed for shooting en masse. 



source https://www.securitymagazine.com/articles/88398-senators-introduce-keep-americans-safe-act-in-wake-of-las-vegas-shooting

Pennsylvania Teachers Could Soon Have Guns at School

Pennsylvania's State Senate passed a bill that would allow school districts the option of permitting employees trained in handling and using firearms to possess them on school premises for additional security.



source https://www.securitymagazine.com/articles/88397-pennsylvania-teachers-could-soon-have-guns-at-school

One-fifth of Americans Report a Workplace That is Hostile or Threatening

A study by Rand Corporation has found that one in five workers say they face a hostile or threatening environment at work, which can include sexual harassment and bullying.



source https://www.securitymagazine.com/articles/88396-one-fifth-of-americans-report-a-workplace-that-is-hostile-or-threatening

Tokyo Tops List of the World's Safest Cities

The Economist report has analyzed 60 cities across 49 indicators spanning digital, climate, infrastructural, health and personal security concerns, and found Tokyo to be the safest.



source https://www.securitymagazine.com/articles/88395-tokyo-tops-list-of-the-worlds-safest-cities

Saturday, 14 October 2017

Gunshot Wounds Cost $2.8 Billion Per Year in Hospital Care to Treat

Gunshot wounds cost Americans $2.8 billion in hospital bills alone per year, according to a new analysis that was published in the journal Health Affairs.



source https://www.securitymagazine.com/articles/88394-gunshot-wounds-cost-28-billion-per-year-in-hospital-care-to-treat

Miami Beach Buys Insurance for Terrorism, Active Shooter Incidents

Miami Beach leaders recently signed an insurance policy protecting the city for up to $100 million of catastrophic property damage in cases of terrorism or an active shooter.



source https://www.securitymagazine.com/articles/88393-miami-beach-buys-insurance-for-terrorism-active-shooter-incidents

Ontario's Proposed Domestic Violence Workplace Leave

Ontario's plan for Fair Workplaces and Better Jobs proposes to create a new unpaid job-protected leave of absence under the Employment Standards Act, 2000 (ESA) where an employee or an employee's child has experienced or been threatened with domestic or sexual violence.



source https://www.securitymagazine.com/articles/88392-ontarios-proposed-domestic-violence-workplace-leave

Friday, 13 October 2017

Integrated Technology for Active Shooter Preparedness

When an Active shooter event occurs, it takes all available tools to mount a response. Solid technology is one thing, but smart integration can mean the difference between life and death. Get a glance at how multiple security technologies can be integrated to improve outcomes.

source https://www.securitymagazine.com/articles/88362-integrated-technology-for-active-shooter-preparedness

Whitepaper: How to Complete Your Workplace Violence Plan

Workplace violence is a subject no employer can afford to ignore.

source https://www.securitymagazine.com/articles/88361-whitepaper-how-to-complete-your-workplace-violence-plan

Guardian Indoor Active Shooter Detection Systems

In an analysis of 160 active shooter incidents from 2000 through 2013, the FBI found that more than two-thirds happened at businesses or schools. 2014 to 2015 had the most active shooter incidents ever recorded in a two-year period. These sobering statistics make it clear that protecting employees from this threat needs to be a security priority.

source https://www.securitymagazine.com/articles/88356-guardian-indoor-active-shooter-detection-systems

Whitepaper: Five Rules for Mass Notification

In the event of a workplace violence incident — or any emergency — timely communication is essential when it comes to minimizing the incident’s impact, protecting people’s health and safety, bringing order to a chaotic situation, and enabling first responders to perform their duties safely and efficiently.

source https://www.securitymagazine.com/articles/88353-whitepaper-five-rules-for-mass-notification

Which Active Shooter Policy is Best?

Active shooter incidents in the United States continue to rise in frequency, with FBI statistics showing the highest average of incidents ever in a two-year period.

source https://www.securitymagazine.com/blogs/22-active-shooter-blog/post/88364-which-active-shooter-policy-is-best

When the Active Shooter Strikes: Emergency Action Planning for Security Professionals

For organizations, response to both real and perceived active shooter events can have long-term effects including damage to brand and exposure of security weaknesses to the public. The key is to create multi-layered policies and procedures to respond during and after a crisis event.

source https://www.securitymagazine.com/articles/88354-when-the-active-shooter-strikes-emergency-action-planning-for-security-professionals

The Las Vegas Massacre: The Anatomy of a Catastrophic Security Failure

Less than two weeks ago, we watched and heard the horror come to life as the news broke that killer Stephen Paddock (the killer) had opened fire from the Mandalay Bay Resort and Casino on a crowd of concertgoers attending the Route 91 Country Music Festival in Las Vegas.



source https://www.securitymagazine.com/blogs/14-security-blog/post/88391-the-las-vegas-massacre-the-anatomy-of-a-catastrophic-security-failure

Thursday, 12 October 2017

Study Says Baby Boomers More Concerned About Cybersecurity Than Millennials

A new study examined how different generations view cybersecurity threats, and found that baby boomers generally have better cybersecurity habits and are more concerned about protecting their personal information than younger generations.



source https://www.securitymagazine.com/articles/88390-study-says-baby-boomers-more-concerned-about-cybersecurity-than-millennials

Texas Report Card Gives Infrastructure a “C-“

A report by the American Society of Civil Engineers (ASCE) finds there is work to be done and an opportunity to modernize the Texas state infrastructure.



source https://www.securitymagazine.com/articles/88389-texas-report-card-gives-infrastructure-a-c-

Earthquake Program Bill Introduced in Senate

Senators Dianne Feinstein (D-Calif.) and Lisa Murkowski (R-Alaska) introduced the National Earthquake Hazards Reduction Program Reauthorization Act, a bill to reauthorize a national program to improve the nation’s earthquake preparedness.



source https://www.securitymagazine.com/articles/88388-earthquake-program-bill-introduced-in-senate

Monday, 9 October 2017

Four Days in June: Eligible Receiver and the Start of the Cybersecurity Industry

Over a four-day period in June twenty years ago, hackers simulated an attack on the power grids and 911 emergency systems in eight U.S. cities and then infiltrated and took control of U.S. Pacific Command computers.



source https://www.securitymagazine.com/articles/88383-four-days-in-june-eligible-receiver-and-the-start-of-the-cybersecurity-industry

Sydney, Copenhagen Named Most Reputable Cities

Sydney, Australia, and Copenhagen, Denmark claimed the top two spots as the world’s most reputable cities in the Reputation Institute’s 2017 City RepTrak®.



source https://www.securitymagazine.com/articles/88385-sydney-copenhagen-named-most-reputable-cities

Retail Cyber Intelligence Sharing Center Announces New Board Members and Leadership

The Retail Cyber Intelligence Sharing Center (R-CISC) announced new leadership for its Board of Directors and the addition of two new Board member companies.



source https://www.securitymagazine.com/articles/88384-retail-cyber-intelligence-sharing-center-announces-new-board-members-and-leadership

IFPO Announces New Board of Director

The International Foundation for Protection Officers (IFPO) announced the appointment of Dr. Jennifer Hesterman to its Board of Directors.



source https://www.securitymagazine.com/articles/88382-ifpo-announces-new-board-of-director

Saturday, 7 October 2017

Security After the Las Vegas Incident

After Stephen Paddock killed 58 people and wounded 489 in Las Vegas, the question will be asked: What can be done to mitigate the possibility of another tragic Las Vegas event?



source https://www.securitymagazine.com/articles/88381-security-after-the-las-vegas-incident

Friday, 6 October 2017

Thursday, 5 October 2017

6 Best Practices that Reduce Third-Party Cybersecurity Risk

Cybersecurity threats are increasingly sophisticated and targeted. Hackers who want your information or want to disrupt your operations are looking for any way into your network.

source https://www.securitymagazine.com/articles/88378-best-practices-that-reduce-third-party-cybersecurity-risk

It’s Time for Security Education to Get Real

The reality is that America’s data is under siege by a very determined and motivated group of cybercriminals.

source https://www.securitymagazine.com/blogs/14-security-blog/post/88377-its-time-for-security-education-to-get-real

5 Basic Rules to Build an Effective Security Awareness Program

Your main users are not Spartan warriors. They are not professional security geeks. They don’t think like hackers. Elevated security measures do not come naturally to most people. They all have real jobs to do which are NOT focused on information and cybersecurity.

source https://www.securitymagazine.com/articles/88376-basic-rules-to-build-an-effective-security-awareness-program

Preventative, Corrective & Detective Ways to Protect Your Data After the Equifax Breach

U.S. credit reporting agency Equifax has confirmed that an Apache Struts vulnerability exploited in the wild since March was used to breach its systems and cause possibly one of the worst leaks of highly sensitive personal and financial information.

source https://www.securitymagazine.com/articles/88375-preventative-corrective-detective-ways-to-protect-your-data-after-the-equifax-breach

Document Security Requires a New Approach

In today’s connected, always-on digital world, information security is one of our most vexing and constantly evolving problems.

source https://www.securitymagazine.com/blogs/14-security-blog/post/88374-document-security-requires-a-new-approach

The Small and Medium Business’ False Sense of Cybersecurity

The first objection to a proper cybersecurity program is typically the cost – most small and medium organizations have not budgeted for or considered cyber as part of their business continuity plan.

source https://www.securitymagazine.com/blogs/14-security-blog/post/88373-the-small-and-medium-business-false-sense-of-cybersecurity

Virtualization: A Battlefield for Security Leaders

The increasing adoption of hybrid cloud – a mix of public cloud services and privately owned data centers, already in place for 70 percent of companies on a global level – is giving rise to new security challenges and prompting CISOs to adopt different technologies to fight zero-day exploits, advanced persistent threats, and other devastating types of cybercrime.

source https://www.securitymagazine.com/articles/88372-virtualization-a-battlefield-for-security-leaders

Wednesday, 4 October 2017

DHS Acting Chief Calls For Urgency To Attack Cyber Job Shortage

Department of Homeland Security Acting Secretary Elaine Duke told a U.S. Chamber of Commerce cybersecurity summit today there is a need to create a sense of urgency to ease the shortage of cyber professionals.



source https://www.securitymagazine.com/articles/88371-dhs-acting-chief-calls-for-urgency-to-attack-cyber-job-shortage

Consumers Suspicious of Facial Recognition

A new poll by Morning Consult shows many Americans are wary of using products that employ facial recognition technologies.



source https://www.securitymagazine.com/articles/88369-consumers-suspicious-of-facial-recognition

Monday, 2 October 2017

Sunday, 1 October 2017

Legislation Introduced to Reform TSA

The leaders of the Senate Commerce Committee have introduced a bipartisan bill to modernize the TSA. 



source http://www.securitymagazine.com/articles/88367-legislation-introduced-to-reform-tsa

Every Third Computer Attacked was from the Manufacturing Sector

A new report from Kaspersky Lab found that in the first half of the year, the manufacturing industry was the most susceptible to cyberthreats.



source http://www.securitymagazine.com/articles/88366-every-third-computer-attacked-was-from-the-manufacturing-sector

Over the Horizon: Emerging Security Threats and Risks to the Enterprise

We are entering a period of time when we are going to see an uptick in the number of security threats, both physical and in cyberspace. There is an increasing global unrest. Over the past few months what we’ve seen electorally, in the U.S., but also in Europe and in other parts of the world, has been a manifestation of that.

source http://www.securitymagazine.com/articles/88352-over-the-horizon-emerging-security-threats-and-risks-to-the-enterprise

Protecting History: A Culture of Security at the Art Institute of Chicago

The Art Institute of Chicago hosts 1.5 million visitors annually, holds 300,000 works of art, serves as the venue for hundreds of private events every year and is a cornerstone of downtown Chicago tourism. All of these factors make security absolutely essential and absolutely challenging.

source http://www.securitymagazine.com/articles/88351-protecting-history-a-culture-of-security-at-the-art-institute-of-chicago

Preserving & Securing: Keeping Security Discreet at the Darwin Martin House

Iconic American architect Frank Lloyd Wright was commissioned to build a unique residential complex for Buffalo, New York, businessman Darwin D. Martin and his family between 1903 and 1905. Scholars consider the complex of six interconnected buildings as one of Wright’s finest achievements, but the history of the house has been a rocky one.

source http://www.securitymagazine.com/articles/88350-preserving-securing-keeping-security-discreet-at-the-darwin-martin-house

University Campuses Take Center Stage

Bike thefts, drug abuse, assaults and other violent crimes, protest-counterprotest melees, and cyber hackers are crowding onto the ever-expanding plates of college and university police and security forces. But those in the field say they’re up to those myriad challenges thanks to the combination of equipment, technology and training they can bring to bear.

source http://www.securitymagazine.com/articles/88348-university-campuses-take-center-stage

Regent Trains Cyberwarriors of the Future with 'Cyber Range'

All colleges and universities have been ramping up their cybersecurity efforts during the past decade, but where do the trained professionals to meet their needs – and those of other industries – earn their credentials? Regent University has started providing an answer to that question during the past couple of years by building a state of the art “cyber range” on its Virginia Beach campus.

source http://www.securitymagazine.com/articles/88349-regent-trains-cyberwarriors-of-the-future-with-cyber-range

The Bill Zalud Memorial Award for Professional Excellence

Introducing the Bill Zalud Memorial Award for Professional Excellence by International Foundation for Protection Officers (IFPO) that will be awarded each year to an individual or organization for professional excellence and/or outstanding service/acts in the security profession.



source http://www.securitymagazine.com/articles/88347-the-bill-zalud-memorial-award-for-professional-excellence

Winning the Security Budget Game

Developing budgets that make sense, support the mission of the enterprise, are thoroughly justified and garner the support of the C-suite is a challenge that security executives have faced for ages. Why is this the case? Is it that the C-suite doesn’t recognize the importance and value that an effective security program provides to the enterprise? Is it because security executives have not done an effective job of developing and documenting the inherent value to the enterprise of an effective security program?

source http://www.securitymagazine.com/articles/88346-winning-the-security-budget-game

Are Security Degrees What They Seem?

Acquiring a higher-level education is time consuming and expensive, and fraudsters have long been marketing fast-track ways to obtain what appears to be an impressive diploma, at least on the surface. These programs and methods have been around for many years; therefore, it is not always easy to identify what is real and what is a wasted investment of your money and time.

source http://www.securitymagazine.com/articles/88345-are-security-degrees-what-they-seem

Culture First, Technology Third

The bottom line: Culture is another way of saying “This is how we do things around here.” In most cases, what is written down or hung on the wall does not align with “how we do things around here.” People will perform their roles, work within their processes and utilize technology to get things done; but the values that undergird their behavior and the ability to understand them and leverage them is one of the keys to unlocking the value of security.

source http://www.securitymagazine.com/articles/88344-culture-first-technology-third

Understanding the Distinct and Dependent Roles of Data, Privacy and Cybersecurity Professionals

Taking advantage of technology and digitization involves more than business strategy. It requires strong data governance principles which, among other things, must align the functional demands of an organization’s cybersecurity, privacy and information management teams.

source http://www.securitymagazine.com/articles/88343-understanding-the-distinct-and-dependent-roles-of-data-privacy-and-cybersecurity-professionals

Complying with California's Workplace Violence Prevention in Healthcare Rule

Effective this past April 1, 2017, healthcare employers in California must comply with a host of new workplace safety requirements focused on preventing workplace violence.

source http://www.securitymagazine.com/articles/88342-complying-with-californias-workplace-violence-prevention-in-healthcare-rule

Nearly All Large Businesses Have a Cybersecurity Policy, But Is It Strong Enough?

Ninety-four percent of large businesses in the U.S. have a cybersecurity policy, according to the 2017 Cybersecurity Survey by Clutch, and most of them have had a policy for more than three years. U.S. enterprises are more likely to have a cybersecurity policy than most global organizations (two-thirds of which lack a formal cybersecurity policy), and policies most commonly include required security software, backups, scam detection and security incident reporting protocols.



source http://www.securitymagazine.com/articles/88341-nearly-all-large-businesses-have-a-cybersecurity-policy-but-is-it-strong-enough