May-June 2019

Image Courtesy of BigStock.com
Drugs, alcohol and an increase in acute behavioral health patients are making emergency departments and other high-risk areas of hospitals places where violence can emerge with little or no warning.
Healthcare

Risks on the Rise in Healthcare Sector

June 17, 2019
Stats show that healthcare workers suffer nearly as many violent attacks as all other business sectors combined
Image Courtesy of BigStock.com
Bigstock Iot Theme With Man Writing On 285460267
Cybersecurity

Industry Voice: A Conversation with Kevin von Keyserling

June 17, 2019
Forging a successful digital security strategy for healthcare
Photo Courtesy of Allied Universal
Security professionals can be trained to take on a customer service role.
Protective Operations & Guard Services

Making Security’s Partnership with Healthcare Seamless

The evolving role of security creates an opportunity to leverage the expanded roles in other disciplines
Image Courtesy of BigStock.com
Bigstock Doctor Or Nurse At Hospital M 258606754
Protective Operations & Guard Services

Healthcare Security Crisis: What’s Keeping Them Up at Night

June 17, 2019
The statistics are staggering. The reality is frightening. Recent OSHA figures show that close to 75 percent of nearly 25,000 assaults and other workplace violence reported annually...
Image Courtesy of BigStock.com
A cyber breach is just as damaging as any other breach of trust, with the potential to ruin a firm’s credibility, and by extension, its long-term viability as a business.
Breach Detection

3 Steps Professional Services Firms Can Take to Mitigate a Breach

June 17, 2019
Given the consequences, now is the time for professional services firms to invest in a comprehensive cybersecurity strategy

More content from May-June 2019

Olsen 1 Camera Fov
Cameras

Guidelines for Setting Camera Field of View

June 17, 2019
Plan your project carefully and understand the mission of the camera array
Image Courtesy of BigStock.com
The advancement of open architecture access control systems and the growth of OSDP-compliant devices is enhancing security.
Access Control

Migrating Access Control to a Secure Future

June 17, 2019
Many EAC manufacturers have updated their devices and adopted the OSDP protocol
Image Courtesy of BigStock.com
When thinking about a user’s security experience in general and in access control specifically, security managers seldom seriously ask themselves what users are confronted with when they use an access control system.
Access & Identity

How to Marry Security Technology With User Experience

June 17, 2019
Striking a proper balance of convenience with advanced technology ensures systems that users will embrace
Image Courtesy of BigStock.com
Candidly, given today’s reliance on information to operate any type of business, is there even really a difference between a CSO and CISO?
Security Executives

Who Is In Charge, Your CSO or CISO?

June 17, 2019
That decision will ultimately depend on who possesses better business acumen and risk sensitivity
Timothy Winters is a Senior Executive, Software and IP Networking, at the University of New Hampshire InterOperability Laboratory (UNH-IOL).
Cybersecurity

How to Use Open Standards to Improve Security and Performance Testing

June 17, 2019
Network security and performance are important aspects of design that are closely related. When designing a network, the security is a critical portion. Modern network security...
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). In 2018 IFSEC Global listed Ray as #12 in the world’s Top 30 Security Thought Leaders. He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of the ASIS International member councils for Physical Security and IT Security. Follow Ray on Twitter: @RayBernardRBCS.
Access Control

Determining the Effectiveness of Physical Security Systems

This question has a variety of prompters such as equipment purchase requests, annual maintenance and service budget approvals, security incidents, and unresolved investigations...
John Mc Cumber Headshot 2 Mb 5c75619da5bd7
Cybersecurity

The Magical Imploding Hacker Cons

June 17, 2019
A huge phenomenon in our industry was the emergence of the hacker conference. Just over a decade ago, small groups of self-identified hackers and vulnerability researchers pioneered...
Bigbook 1 24 Spring2019 1
Integrators

Big Book Spring 2019

May 16, 2019
The Security Industry's Product Guide