30Apr 2010

In most cases, there is a fairly obvious answer to this question. Typically, security personnel are deployed in the protection of people and property. In some environments, however, the assets in need of protection are not so obvious. Take a high tech environment, for example, where the assets may be design features of equipment. Or […]

16Apr 2010

Vulnerabilities are opportunities, opportunities for crime, opportunities for rule breaking violations, opportunities for loss.  By definition, a vulnerability is a weakness or gap in a security program that can be exploited by threats to gain unauthorized access to an asset.  Vulnerabilities include structural, procedural, electronic, human and other elements which provide opportunities to attack assets.[1] […]

12Apr 2010

Organizations can obtain a measurable return on investment through cost savings on security personnel deployment, effective implementation of physical security measures, and reduced liability exposure.  Using data driven security, an organization can add to the bottom line in three ways: – Effective Selection and Deployment of Security Measures – Security measures are costly. Proper data […]

09Apr 2010

What types of threats should you be looking at? From a security perspective, a threat is an act or condition that seeks to obtain, damage, or destroy an asset. Threats can be divided into three types: actual, conceptual, and inherent. Actual threats are the crime and security incident history against an asset or at a […]

17Mar 2010

You’re a very busy hospital security manager.  At 2 pm on one of your normal busy days, you receive a call from a man saying he represents a security consulting firm.  He explains that one of the company’s specialties is technical expertise in electronic security design.  He asks if you have any upcoming projects or […]

11Mar 2010

Data driven security is a concept utilized by organizations operating in a constantly changing environment to effectively manage the dynamic risks which challenge their organization. Security professionals operating in today’s increasingly competitive environments face the unique challenge of providing security that reduces crime and loss, is cost effective, and does not expose their organizations to […]