Office security - Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data se...
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption...
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...
What would it take to make an office building perfectly secure, with 100% impregnability? Would you put padlocks on every door and window, and security gates in every corridor? Certainly, this would be very secure, but it doesn’t take a security expert to see how such a setup would be a huge waste of resources, nor would it be convenient for the people who need to work in the building. Cybersecurity challenges But while most businesses recognise that complete perfection in...
The promise of electric vehicles is closer to reality than ever before. New plans and investments at the federal level designate billions of dollars to move our country toward clean energy, including $2 million to help auto manufacturers retool facilities to increase EV production. Additionally, the Biden Administration has announced a goal to create 100% carbon-free electricity by 2035 and a net-zero carbon economy by 2050. Domestic EV marketplace The domestic EV marketplace has grown from...
DevSecOps is a vital strategy with automated security included in every phase of software development. Implementing DevSecOps means application and infrastructure security becomes a shared responsibility amongst the development, operations, and security teams which maximises protection at every level of the organisation. Investing in DevSecOps strategies According to a recent report conducted by the Neustar International Security Council (NISC), an elite group of cybersecurity professi...
The nuances of data privacy continue to bombard organisations from all angles, and, amid the impending sunset of Universal Analytics (UA), it’s time to stop playing catch-up. Instead, by enacting future-proofing strategies around data as a first port of call, long-term compliance can be achieved as an automatic byproduct. Data privacy At data privacy’s ‘sunrise’, companies’ efforts were largely targeted towards the customer, ensuring that the ever-growing extent o...
With shoplifting up, 21% in 2022, Peter Jackson, managing director of Jacksons Fencing explores how retail businesses can better protect their premises from opportunistic thieves. We think of shoplifting as people walking out of a store, pockets bulging with unpaid-for goods. However, in town centres and retail parks, the rear doors of shops and delivery areas can be an opportunity for theft on a much grander scale. Thefts and break-ins It’s not uncommon for thefts to be perpetrated fr...
Two trends in recent years are combining to exacerbate insider threat risks at companies. First, companies continue to foster cultures of openness and collaboration that often run contrary to the needs of a security-oriented mindset. Second, the mainstreaming of hybrid work has made companies’ control over data and device usage during work more tenuous. Addressing insider threats We’ve seen repeatedly that companies have the tools, structural choices, and decision-making power acro...
In the past five years, the retail landscape and the relationship between consumers and businesses has shifted drastically. It wasn’t too long ago when shopping at malls was considered a family activity and consumers shopped at local stores where they knew and interacted with sales personnel. Today, however, malls and interactions with employees are relics that accurately portray the way retail used to work. Retail companies have shifted their consumer model to focus on the online market...
Hybrid cloud computing enables organisations to segregate their resources and workloads on-premise, in a private cloud, or a public cloud. But despite its many benefits, the hybrid environment also creates security concerns. AlgoSec’s co-founder and CTO, Prof. Avishai Wool shares his expert insights on some of these concerns and offers best practices to boost hybrid cloud security. Hybrid cloud computing Hybrid cloud computing combines on-premises infrastructure, private cloud services,...
If defence is the best form of attack, then in security, planned preventative maintenance (PPM) is the best way to protect your business from harm. Also known as PPM, the service ensures that your security efforts are up-to-date and effective. In the latest how-to guide, discover the benefits of planned preventative maintenance and learn how to add PPM to your building. What is Planned Preventative Maintenance? You have installed all of the necessary security measures for your business, now wh...
Although the wider adoption of 5G, together with faster connection speeds and improved bandwidth, opens up new prospects for telecom service providers, it also poses new risks in terms of network security. This article explains how telcos can make their newly-established 5G networks as well as telecom software solutions more impenetrable and secure. Implement robust device authentication protocols 5G is set to spur a wide-scale adoption of connected devices in the business and consumer sphere...
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal...
Nowadays to save costs by making full use of old devices while upgrading the old security projects, many integrators or installers prefer to use video management software to manage multiple brands of video devices (such as IP cameras, and NVR), instead of only one single brand. So that they could have more flexible choices to earn profits while saving costs. Multi-brands video device management On other hand, with market segmentation and specialisation, instead of managing the video by themsel...
Integrators need to be well versed in Total Cost of Ownership (TCO), when discussing video surveillance options with their customers. Business leaders are looking for the best, most economical technology that will address their security needs, and they also want to avoid being blind-sided by unplanned technology operations and service costs. While most folks understand that the initial cost of a video surveillance system is not the same as the total cost of ownership, many might be surprised to...
Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organisations, which ultimately target the operational part of...
Most individuals have strong opinions about what is more essential to our civilisation: personal privacy or security. After more than a decade of technology enabling greater and greater amounts of Personally Identifiable Information (PII) and data harvesting, now the pendulum is swinging towards a society that places more emphasis on individual rights and privacies. This shift is manifesting in a variety of ways, quickly changing the technology, security and cyber security landscapes, and requi...
There is little doubt that security concerns have heightened in the near two years since the pandemic first swept across the globe. A report from Pro-Vigil reveals that nearly one in five companies experienced more physical security incidents since the start of the COVID-19 pandemic, and one in three of the 124 respondents surveyed anticipate further increases in 2021. The tragic terrorist attacks experienced during this period in the UK have caused many organisations to make changes to their...
This is an era of digital revolution and with it comes dozens of new security dangers. Every gadget, from our smartphones to our security cameras, need some kind of protection from external hacking. However, how can we assure the safety of our devices, workplaces, etc.? Biometric security is one such security method that has emerged, since it is both efficient and perceived foolproof. It offers an additional layer of security for businesses and personal security systems. Biometric security syste...
Access control for buildings is nothing new. Early forms of security access for business security systems were introduced in the 1960s, as business owners and managers looked for alternatives to keys, as a result of needing to frequently replace them, when there was a change in personnel. It’s only in recent years that the urgency to implement smarter, more efficient, and convenient forms of access control has increased, in the context of public and private sector digital transformation....
As we enter into 2022, there is still a level of uncertainty in place. It’s unclear what the future holds, as companies around the world still contend with the COVID-19 pandemic. Remote working has been encouraged by most organisations and the move to a hybrid working system has become ‘business as usual’, for the majority of businesses. Some have reduced their office space or done away with their locations altogether. Following best security practices With all this change in...
Cloud-based applications and platforms revolutionise supply chain management, helping stakeholders scale operations from small businesses to complex enterprises. Cloud supply chain solutions are showing significant increases in implementation – so much so the sheer number of organisations with a cloud solution outpace or far outnumbers the ones that don't. But there is one area that has still not made the switch to the cloud, most often the security department. But the advent of using vid...
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of fa...
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-mas...
The ‘new normal’ was all we heard about when it came to the working model shift after the pandemic hit. Businesses worldwide adopted working from home, and then the hybrid model: a balance of remote work and office work. And according to a recent survey by 451 Research, nearly 80% of organisations surveyed said they have implemented or expanded universal work-from-home policies as a result of COVID-19, whilst 67% expect these policies to remain in place either permanently or for th...
Ensuring employee health and safety remains a key priority for organisations this year, especially as we see COVID-19 cases continue to rise in different areas of the world. As an ongoing challenge, COVID-19 has shifted the priorities of many organisations. In fact, “improving health and safety for employees” is the top strategic goal this year of manufacturing and logistics organisations in the U.S. and U.K., according to research conducted by Forrester on behalf of STANLEY Securit...
For many businesses and organisations, the term 'authentication' is synonymous with 'password' or 'multi-factor authentication (MFA)’. However, because today's business ecosystem is complex and stretches across distributed workforces with work from home, BYOD policies, and multiple cloud environments, it is very challenging to efficiently recognise and authenticate identities of people, processes, and devices throughout the enterprise using traditional methods. The problem with passwords...
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download