Author: Intern 007

  • 12 Guides on How to Conduct a Tabletop Physical Security Exercise

    12 Guides on How to Conduct a Tabletop Physical Security Exercise

    A tabletop security exercise is a discussion based interactive session where stakeholders meet in either formal or informal setting (meeting or conference room) to discuss roles and expected responses in the event of a particular security breach. Other types of security simulation include drills, penetration test, seminar, or conference. A security practitioner grounded in operational…

  • Physical Key Management Practices for Organizations

    Physical Key Management Practices for Organizations

    Physical key management is important in today’s business world, although oftentimes overlooked and approached with levity. Effective key control is key for security, managing risks, and protecting assets of your organization. Whether it’s about logging and tracking issued keys, the principle of key management will play significant role in the overall security of your organization.…

  • Social Engineering Attack – What Your Organization Should Know

    Social Engineering Attack – What Your Organization Should Know

    Social engineering is a human threat vector from cybersecurity point. It simply means the criminal action of exploiting human nature rather than technical path to gain unauthorized access to people’s minds, digital systems, data and other assets. We cannot talk about this threat enough; it is oftentimes the most relegated and the most exploited of…

  • Emerging Trends in Physical Security

    Emerging Trends in Physical Security

    Contemporary physical security is concerned with traditional security roles, assets protection, and loss prevention. All services are offered concurrent such that it cannot be cleared understood by a lay person. Emerging trends have kept the industry evolving rapidly. Traditional security refers to routine tasks that involve control of access to premises through checks, credentials authentication…

  • Security Implications of Dark Web – Copy

    Security Implications of Dark Web – Copy

    Dark web is one of the three layers of web on the world wide web; other are surface web and deep web. This article highlights some of the activities on dark web and their overall security implications. Surface web: also known as clean or visible web is a part of the web for public use.…

  • Five Sources of Workplace Violence and How To Prepare For Its Prevention and Response

    Five Sources of Workplace Violence and How To Prepare For Its Prevention and Response

    Workplace violence is an inevitable security risk which your organization should get ready to deal with. Having emergency preparedness plan in place will provide formidable leverage for your business risk and resilience team. Workplace violence is any act of verbal, physical or emotional assault and harassment carried out against a victim within the confines of…

  • 4 Types Of Phishing Attacks And 10 Signs To Know A Phishing Email

    4 Types Of Phishing Attacks And 10 Signs To Know A Phishing Email

    Phishing is a type of social engineering attack built on manipulating and deceiving people to reveal confidential and private information which is then used to carry out further crime against them.  This attack takes advantage of gullibility and vulnerability of human emotion to steal from people. Phishing attacks have become a popular, easy to use…

  • Travel Security Understanding TSA Approved Locks

    Travel Security Understanding TSA Approved Locks

    Travel security refers to measures taken by an intending traveler to ensure protection for self and luggage. In an increasing global village, travelling both local and overseas has become a routine part of most corporate duties especially for executive personnel and others based on personal demands. Travel security speaks to millions of people who throttle…

  • 13 Benefits Of CCTV To Your Organization

    13 Benefits Of CCTV To Your Organization

    CCTV surveillance system has proven to be a high value tool for safety and security as well as productivity; whether it is deployed to personal, public or industrial settings. Twenty-first century security and safety has come to depend strongly on this technology as a reliable complement to other resources. The acronym CCTV, means Closed-Circuit Television.…

  • 20 Safety and Security Tips For Hotel Guests

    20 Safety and Security Tips For Hotel Guests

    Hotel is known for leisure and pleasure. It is a place where people run to when there is need for home away from home, exciting experience, relaxation, fun, corporate meetings, conferences, seminars, etc.  Everything about it revolves around exciting and exclusive experience. The industry has been enjoying very wide patronage across globe due to increasing…

Ad Blocker Detected

To access this content, please disable your ad blocker and reload the page.

This message will remain until ads are visible.