Author: Intern 007

Security Implications of Dark Web
Dark web is one of the three layers of web on the world wide web; other are surface web and deep web. This article highlights some of the activities on dark web and their overall security implications. Surface web: also known as clean or visible web is a part of the web for public use.…

16 Trending Physical Security Threats Every Corporate Organization should Prepare to Deal with
Physical security is responsible for overall protection of assets, people and information in the business place. Threat is any person, group, and/or activity that have potential to cause breach of security within a defined space. While the underlie principle of physical security has universal application; what may be defined or accepted as threat is relative…

Five Sources of Workplace Violence and How To Prepare For Its Prevention and Response
Workplace violence is an inevitable security risk which your organization should get ready to deal with. Having emergency preparedness plan in place will provide formidable leverage for your business risk and resilience team. Workplace violence is any act of verbal, physical or emotional assault and harassment carried out against a victim within the confines of…

Your Email Security Best Practices
Email has become a significant part of modern-day digital relationships. You can hardly have online presence without a functional email address. Most digital interactions in one way or the other would require sign-in, sign-up, or both using email address. For instance, handheld mobile device like iPhone or android cannot function without optimizing it through email…
Domains Of Security And How They Impact Lives
Security appears to be synonymously connected to almost every aspect of human existence. Sociologically; society, in all ages has been functioning through contribution of interdependent human interactive silos. Every arears of human interactions although has exclusive social identity, is however, inherently designed to be mutually inclusive of others. To maintain effective functionality, such endeavor must…

Determined Attacker – The Secret Destroyer
The strength of your security system comes to huge test during the clandestine actions of a determined attacker. It is said; a chain is as strong as its weakest links. A determined attacker is any complex person or group who are hell-bent on compromising the security system of a facility in order to carry out…

Insider Threat Management And Guide
Insider threat whether intentional or accidental can significantly harm your organization by causing financial loss, business disruption, reputational damage, and sometimes breach of compliance and associated sanctions and possible fine. This article aims to draw attention to this subject and briefly outline how to preventively manage insider threat. Suffice to say, many businesses tend to…

Security Operations Centre – SOC Essentials For Physical Security Operation
Security Operations Centre otherwise known as SOC is a central hub for security operations. The concept was originally applicable to cybersecurity operations. However, it is no more an exclusive field. Futuristic physical security is increasingly optimizing its operation through adaption of this niche functions of surveillance and response. With Artificial Intelligence dominating business world, Security…

7 Benefits To Choosing Corporate Security Trainings And Certifications
Corporate security trainings and certifications are the way to go in order to remain competitive and relevance in the industry. Corporate security industry is currently attracting professionals from various backgrounds. A corporate security professionals may come from the public law enforcement or the private industry. One of the things that unify these professionals on the…









