off

Meeting The Security Challenge of BYOD

Bring Your Own Device (BYOD) refers to a policy which oversees employees using company networks and data on their personal devices. IT staff are often wary of such policies, but management seem to like them as they allow for a more streamlined workflow and a reduction in the...
Posted On 27 Jun 2018
off

CCTV: Avoiding Expensive IT Storage Mistakes

The benefits of HD IP cameras are well known, with such solutions now rapidly replacing older analogue and early IP camera systems. Whether the images are being stored for longer, or the higher resolution of the cameras is generating more data, it’s clear that more storage is...
Posted On 27 Jun 2018
off

Contact Centres: Adapting Security Methods to Fight Fraud

From banks and insurance providers through to utility companies and major retailers, many of today’s organisations operate Contact Centres (or, at the very least, outsource their customer service to one), writes Ben Taylor. Brands and businesses are placing a heavy emphasis...
Posted On 25 Jun 2018
off

Modernising and Digitising CCTV: Challenges for the Police Service

Currently, the UK’s public sector is faced with an economic climate that demands today’s services ‘do more with less’. One of those services is surveillance. Given the recent spate of criminality – and a surge in knife crime in particular since the start of this year –...
Posted On 22 Jun 2018
off

When Two Worlds Coalesce

The demands of a modern day security system are changing at pace as different technologies appear on the horizon. These rapid developments very often realise benefits for the procuring organisation by dint of inviting decisions to be taken by security and risk management...
Posted On 11 Jun 2018
off

Digital Walls: Protecting Remote Critical National Infrastructure

Critical National Infrastructure (CNI) fuels everyday life, writes Richard Revis. CNI assets – like oil pipelines and reservoirs, for example – need to be protected at all costs from those who intend to steal resources or cause damage. However, the security process is...
Posted On 01 Jun 2018
off

Focusing on Improved Total Cost of Ownership

Total Cost of Ownership is a hot topic in security circles and frames a dialogue that manufacturers are increasingly having with specifiers, installers and end users alike, writes John Davies. The days of shifting cheap boxes are long gone as the market, very sensibly, has...
Posted On 22 May 2018
off

Securing Critical Assets

Access control systems have come a long way since the invention of the lock and key. Advancements in technology have realised solutions to be integrated with web-based systems, allowing for traceability and time management within mechanical keys. Here, Pip Courcoux discusses...
Posted On 15 Apr 2018
off

The Risk Management Journey

There’s no crystal ball that will magically outline opportunities, map risks and provide a distinct and unobstructed path to success. Nonetheless, as Steve Schlarman observes, there are specific stages that organisations can expect to move through when building an integrated risk...
Posted On 15 Apr 2018
off

Successful Cloud and Mobile Technology Strategies: Security of Data

Companies have faced unprecedented security challenges and risks to the integrity of their networks since cloud computing, the Bring Your Own Device (BYOD) concept and mobile technology forged a permanent place in business IT strategies. How, then, might those risks and...
Posted On 15 Apr 2018