• image
  • image
  • image
  • image
  • image
  • image

Security Becoming Less of a Luxury

by Michael Gips | August 1, 2014 | securitymanagement.com

There’s a well-known Monty Python sketch in which four successful Yorkshiremen compete to prove that they suffered the most humble upbringing. When one of the four boasts of growing up in a tiny tumbledown house with holes in the roof, another counters that his whole family lived packed in a single room.

Read more: Security Becoming Less of a Luxury

School security plans should prepare students to expect the unexpected

by Patrick Fiel, Sr. | April 23, 2014 | securityinfowatch.com

School administrators have long feared an active shooter on campus. Now, they also have to consider and plan for the active slasher. Earlier this month, a high school sophomore armed with two large kitchen knives entered Franklin High School in suburban Pittsburgh and began stabbing and slashing students in crowded hallways. Before he was detained, 19 students and a security guard were injured.

Read more: School security plans should prepare students to expect the unexpected

LP gets bigger ROI when aligning with operations, finance

by Amy Canfield | June 16, 2014 | securitydirectornews.com

OTTAWA, Ontario—Total Wine & More, the nation’s largest retailer of fine wine, is using its video surveillance to capture essential data when packaging bottles that can retail for up to $2,000 a piece.

Read more: LP gets bigger ROI when aligning with operations, finance

Doctor's sex assault case spurs talk of background checks

by Scott Dance | June 14, 2014 | baltimoresun.com

Lawmakers concerned that Dando rape conviction was missed by licensing board. Revelations that a former Catonsville doctor obtained his Maryland medical license despite having a rape conviction on his record is sparking a push for criminal background checks of physicians — a proposal that has failed and been ignored in recent years.

Read more: Doctor's sex assault case spurs talk of background checks

Social media gives terrorist new tools, not just wider audience

by Zach Rausnitz | May 22, 2014 | fiercehomelandsecurity.com

Facebook, Twitter, YouTube and other social media platforms enable terrorist groups not only to reach a wider audience but to execute new strategies for propaganda and recruitment, says a report published by the Wilson Center.

Read more: Social media gives terrorist new tools, not just wider audience

Physically Securing Medical Equipment with Electronic Access Control

by Steve Spatig | May 20, 2014 | security-today.com

With HIPAA audits approaching, health care providers are concentrating their efforts on ensuring they have the appropriate physical safeguards in place to protect confidential patient information.

Read more: Physically Securing Medical Equipment with Electronic Access Control

Emergency messaging explained

by Tess Nacelewicz | May 19, 2014 | securitydirectornews.com

QUINCY, Mass.—Emergency communication systems (ECS) were developed because a fire alarm alone is not always sufficient to tell building occupants what to do in case of an emergency. But what exactly should an ECS message say? There have been no guidelines for that—until now.

Read more: Emergency messaging explained

Cyberattack Drill Exposes Healthcare Industry's Vulnerabilities

by Scott Mace | April 23, 2014 | healthleadersmedia.com

Healthcare organizations are at their weakest not necessarily on technical implementations, but in their ability to coordinate and collaborate across organizations, says a security expert.

Read more: Cyberattack Drill Exposes Healthcare Industry's Vulnerabilities