data center

Physical Security for Data Centers

Emily Schack Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Schematic Design, Security System Bid Process and Evaluation, Security System Budget Development and Estimating, Security System Concept Development, Security System Construction Document Development, Security System Design Development, Security System Lifespan Management, Security System Testing and Commissioning, Security Threat Assessment

It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …


Hotel Locks

Emily Schack Security Assessment, Security Survey, Security Threat Assessment

Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …

unknown subject

Intruder in the Attic

Emily Schack Security Assessment, Security Survey, Security Threat Assessment

The original news story can be found here. An ex-boyfriend from twelve years ago came back to haunt a woman – literally. A single mother of five children in Rock Hill, South Carolina, thought an animal had gotten into her attic when she heard a thump and then saw some nails popping out from her bedroom ceiling one night. Her …