IAHSS publication

Body Worn Camera Use in Health Care Facilities

Dana Frentz, CHPA, PSPCompliance, News, Security Program Development

>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …

dark web

What Is the Dark Web?

Amanda StricklandComputer Forensics

I am not a computer techie, just an average computer, smart phone, and iPad user. I use the Internet for email, word searches, research, and of course the occasional shopping experience. Have you ever wondered: what is the Dark Web? I must admit I am a bit curious. Could it be that bad to just Google the words “Dark Web” …

empty classroom

Reflections on Oregon Shooting

Christine L. Peterson, CPP, ISPSecurity Program Development, Workplace Violence

The shooting at Umpqua Community College on October 1, 2015, made us think. Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting to commit harm. What we can do is harden ourselves as targets. This will …

data center

Physical Security for Data Centers

Emily SchackSecurity Assessment, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Testing and Commissioning

It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …

Policy and Procedure Flow Chart

A Company Model for Developing Policies and Procedures

Christine L. Peterson, CPP, ISPCompliance, Security Program Development

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley data security breach scares me as an employee. Reportedly, Morgan Stanley terminated Galen Marsh, a financial adviser, for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. Federal law enforcement officials are focusing their probe on the possibility that Marsh’s computer …

sick person

Avoiding Pandemic Paranoia

Billy Gordon Green, Jr. M.Ed., CPP, CHSCompliance, Crisis Management Planning, Security Program Development, Training

Twice during the past decade and a half, the specter of pandemic has been a cause for prudent worry in the public health sector, among business continuity planners, and certainly within the security community. Security professionals would not be tasked with reducing the impact upon the public or generally with providing for the continuity of operation for a large corporation, …

global integration

Managing Global Integration of Systems

Amanda StricklandSecurity Master Planning, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Lifespan Management

During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …

the cloud

Security Suggestions – The Cloud and Your Data

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Intellectual Property

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”. Hopefully I will answer these questions as I discuss ways to keep your data secure on the Cloud. There are a …

college students

The SaVE Component of the Clery Act

Christine L. Peterson, CPP, ISPCompliance, Security Master Planning, Training

Are You Ready for October 1, 2014? According to the CDC, on average, 1 in 5 women (18.3%) and 1 in 71 men (1.4%) reported experiencing rape at some time in their lives. In a study of undergraduate women, 19% said that they experienced an attempted or completed sexual assault since entering college (Source: www.cdc.gov/violenceprevention/pdf/sv-datasheet-a.pdf). The victimization of college students …