off

Security By Design

When it comes to protection regimes for today’s organisations, there’s simply no ‘one size fits all’ solution. It’s a fact that every client and contract represents a unique proposition for the security companies with whom they engage. That being so, Anthony Owen outlines...
Posted On 20 Mar 2019
off

Cyber Security: Why Hacking Isn’t Always Bad News

Cyber security is an evolving discipline. It’s an ongoing endeavour to beat the hackers and cyber criminals at their own game and mitigate the risk they represent. As Scott Nicholson points out, though, for many organisations this is easier said than done. While the...
Posted On 19 Mar 2019
off

Embassy Security: The Layered Response

As the representative offices of Governments overseas, Embassies, Consulates and High Commissions have always required high levels of security, and particularly so in areas where terrorist cells and disaffected groups may operate. As Tim Northwood outlines, the Best Practice...
Posted On 13 Mar 2019
off

Risk Management: Upgrading the Approach to Access Control

‘If it ain’t broke, don’t fix it’ is a mantra that often describes the best course of action for many situations in life, writes Nick Smith. It’s a phrase that’s probably best suited to something like a bookcase or an oven, but it also often describes the...
Posted On 04 Mar 2019
off

The Growing Importance of Risk Transfer and Cyber Insurance

As data mega-breaches dominate the mainstream news headlines, businesses worldwide are necessarily focusing on how to manage and mitigate cyber risk. The Marriott breach is only the latest in a litany of incidents whose repercussions will surely echo for a long time to come, but...
Posted On 19 Feb 2019
off

Five Essential Tools for Supply Chain Risk Management

All areas of risk management – including supply chain risk management – involve ‘blind spots’. To be effective in this field, asserts Jake Olcott, risk professionals must account for risks from a wide variety of sources, from bad password management...
Posted On 19 Feb 2019
off

Print and Printer Security: Why The Threat is Real

Cyber security is, of course, already high on the agenda for both risk professionals and C-Suite executives who have realised the financial cost, legal implications and reputational damage that can result from a serious data breach.  However, while most responsible organisations...
Posted On 18 Feb 2019
off

2018’s Major Security Breaches: How They Could Have Been Avoided

2018 was a year of both highs and lows for information security, asserts Guy Bunker. The enforcement of the EU’s General Data Protection Regulation (GDPR) took full effect in May which brought the importance of protecting sensitive customer data to the forefront of people’s minds...
Posted On 11 Feb 2019
off

The Importance of Business Risk to the Enterprise

Business risk is foundational to business risk intelligence, but it’s also commonly misunderstood because its scope extends far beyond what security practitioners typically deal with on a daily basis. Broadly speaking, asserts Josh Lefkowitz, business risk refers to the...
Posted On 05 Feb 2019
off

Improving Life Safety in the HMO Sector: Better Protection for Properties and Occupants

Fire episodes and general life safety issues within Houses in Multiple Occupation (HMO) are being discussed more so now than ever before. With a number of high-profile events casting a spotlight on the overriding importance of the subject, leaders from a multitude of sectors and...
Posted On 01 Feb 2019