In an increasingly interconnected world, businesses from all industries must ensure that cross-team communication is flawless. Not only is it important in order for specific job roles to function effectively, but also from a safety perspective as well, asserts Klaus Allion. From lone workers to…
Smart Phones
-
-
On Monday 11 and Tuesday 12 November, security practitioners, law enforcement professionals, academics and policymakers joined forces in Bristol to debate the ethical use of surveillance at the 21st edition of the annual Global MSC Security Conference and Exhibition. Official Media Partner Risk Xtra reports…
-
Forty years ago, DEC (latterly acquired by Compaq) said there was no reason why anyone would want a computer in their home. Thirty years ago, the Internet was invented and, ten years ago, we had only just discovered smart phones and social networking. The world…
-
PAC & GDX, the provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting-edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has…
-
Safety alerts elicit an urgent response with good reason. Put simply, the cost of not responding in time is potentially astronomical. Fire, for example, can destroy equipment and entire buildings and have catastrophic human cost. Businesses are naturally committed to keeping their staff, property and…
-
Trusted identity solutions developer HID Global has extended the capabilities of its HID goID mobile identity solution that enables Government agencies to move from physical documents to mobile IDs on individuals’ smart phones. The latest addition to HID’s mobile identity offer, the HID goID Simple…
-
Traditional login systems have enjoyed a remarkable longevity, writes Piergiorgio Vittori. Today, though, they’re no longer fit for purpose. The problem is not with the concept of the username and password combination. Rather, it’s that the system relies on the weakest element of any information…
-
Inner Range has joined forces with IGNIS Fire Protection Services on a project to provide secure access control for a popular cosmetic surgery clinic located in Birmingham. Room-by-room access control and intruder detection was needed following a move by the client company to new premises…
-
As reported in the national media last week, Facebook recently revealed that a major vulnerability had been discovered in its hugely popular messaging service WhatsApp. According to The Financial Times, the vulnerability had been open for weeks, allowing hackers to inject spyware into mobile phones…
-
People often search for Wi-Fi whenever they’re outwith the comfort of their homes and offices, or when they’re travelling for any particular reason. The trouble is that public Wi-Fi is often insecure, and this could allow someone to hack into their laptops, their tablet computers…