key

Hotel Locks

Emily Schack Security Assessment, Security Survey, Security Threat Assessment

Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCE Crisis Management Planning, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Theft

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

unknown subject

Intruder in the Attic

Emily Schack Security Assessment, Security Survey, Security Threat Assessment

The original news story can be found here. An ex-boyfriend from twelve years ago came back to haunt a woman – literally. A single mother of five children in Rock Hill, South Carolina, thought an animal had gotten into her attic when she heard a thump and then saw some nails popping out from her bedroom ceiling one night. Her …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISP Business Continuity Planning, Counterfeiting, Crisis Management Planning, Diversion, Embezzlement, Fraud, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Tampering, Theft, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …