off

From Firewalls to Fine Grain Permissions: Cyber Security Best Practice

Cyber crime is now so prevalent that guarding against it should be part of standard ‘business as usual’ company procedures, but many organisations have been – and continue to be – caught out. In parallel, the risk of physical attacks remains the same, which means that the risk...
Posted On 26 Jul 2019
off

An Innovative Approach for Defeating Cheque Fraud

In our first White Paper of 2019, entitled ‘Fighting Cheque Fraud in the 21st Century: Cheque Fraud Detection in the New Clearing Model’, it was explained that, while volumes have steadily fallen during the 21st Century, the cheque is now a modernised and very...
Posted On 25 Jul 2019
off

Infonomics: Stating The Financial Case for Automated Security

What, exactly, is the value of the data held by your organisation and how does that value justify and inform your security spend? It’s a question that’s increasingly rising to the top of the practising Chief Information Officer’s (CIO) list, not to mention that of the Chief...
Posted On 25 Jul 2019
off

Understanding Fire Safety Sprinkler Systems and Dispelling the Myths

In a recent study conducted by the Business Sprinkler Alliance (BSA), 22% of those respondents surveyed felt there was no necessity to include sprinkler installations in industrial and commercial buildings. The reluctance to install automatic fire safety sprinkler systems in...
Posted On 24 Jul 2019
off

Physical Information Security: Neglect It At Your Peril

Mark Harper discusses how the continual mainstream media focus on cyber attacks and digital data breaches means that organisations could be in danger of neglecting their physical information security, duly highlighting the potential risks to paper-based security and how to negate...
Posted On 23 Jul 2019
off

Shifting Compliance to Effectively Measure Risk: Balancing GRC Mandates

Historically, meeting governance, risk and compliance (GRC) mandates was typically all about ensuring businesses had solutions in place to gain compliance, thus reducing the risk or consequences of non-compliance from the regulators (ie fines and penalties associated with failing...
Posted On 23 Jul 2019
off

Body-Worn Video: The Way Forward for Protecting Lone Workers?

Is body-worn video the way forward when it comes to protecting lone workers? Certainly, the police service has recognised its positive impact for some time. Here, Chris Allcard (lone worker services director at Reliance High-Tech) outlines precisely why he believes body-worn...
Posted On 19 Jul 2019
off

Blocking DDoS Attacks: Cutting Down on Response Times Using Automation

Distributed Denial of Service (DDoS) attacks can be catastrophic, but the right knowledge and tactics will drastically improve the host organisation’s chances of successfully mitigating such episodes. Here, Adrian Taylor explores the five ways in which automation can...
Posted On 10 Jul 2019
off

Enterprise Security Risk Management: A Security Programme Maturity Model

As one of its stated strategic initiatives, ASIS International has been actively involved in promoting the adoption of Enterprise Security Risk Management (ESRM). ESRM is a strategic security programme management approach that ties an organisation’s security practice to its...
Posted On 05 Jul 2019
off

Managing Insider Threats: Why Context is Critical

The subject of ‘The Insider Threat’ is fast rising up on the corporate agenda. While you might think a company’s own employees would be less likely to pose security risks than external attackers, a recent analysis by Computing has found that this type of threat was a...
Posted On 04 Jul 2019