There is no custom code to display.

Columns

Dealing with an Over-Tasked IT Department

Dealing with an Over-Tasked IT Department

Due to the continued acceleration of information technology advancement, many IT departments are undergoing changes, and are under pressure to quickly adopt new technologies that would be of significant benefit to the business. In some organizations this has degraded in IT’s support for electronic security systems. For Security departments experiencing this situation, it is not likely to resolve in the short term without specific action by Security.
High-Value ISC West 2016 Sessions

High-Value ISC West 2016 Sessions

These days I am always scouting around for educational sessions about the status of security and technology, cyber security, cloud services, and the future of security risk management.
Hardening Electronic Physical Security Systems

Hardening Electronic Physical Security Systems

Last month the Security Industry Association (SIA)—well known for its ISC East and ISC West security conferences—announced its formation of the SIA Cybersecurity Advisory Board, which is filled with action-oriented heavy hitters from both the IT and physical security domains. This is another sign that in the very near future, issues like the one this security manager wrote about will no longer be commonplace.
Keeping the Lights On

Keeping the Lights On

More and more, in organizations that don’t have an in-house or corporate physical security department, IT departments and their personnel are being given responsibility for networked security video surveillance systems. Too often it happens that on investigating a nighttime outdoor incident, the video is too dark because some of outdoor lights were burned out, broken, or off their control schedule.
Security Product Life Cycle

Security Product Life Cycle

IT Departments have the purpose of providing the information technology required for the fulfillment of the organization’s mission. Some of the most valuable lessons learned in IT have been those that relate to the management of technology in support of that purpose.
Securing Equipment Rooms with Perimeter Doors

Securing Equipment Rooms with Perimeter Doors

The door hinges on metal perimeter doors in commercial and industrial buildings practically all look the same from the outside. However, many have ordinary hinges whose hinge pins are easily removed from the outside, allowing the hinge side of the door to be opened from the outside. Other doors have security hinges whose hinge pins cannot be removed, and some doors have special security hinges that keep the door from being opened from the outside even if the hinge pins are removed.
The Lure of Default Settings

The Lure of Default Settings

When it comes to the installation of security systems and devices, some installers find it tempting to “turn it on, check it out, and run with factory settings” if everything seems to be working okay. Some default settings leave system vulnerabilities in place, including those relating to passwords and encryption of communications. Plus, most end user customers have configuration needs that go beyond the factory default settings – at least that's what end users have told us. See how to "do it right".