|
Volume 5, Issue 5: December 2013
|
Bring Your Own Device
Christine Peterson Every device connected to a network - including smartphones, tablets, and laptops - is a potential point of attack or vulnerability for a network. So why would companies allow employees to connect personal devices to the company network? What are the costs associated with personal devices connected to the business network? Read More... |
Full-time versus Part-time Officers
Billy Green The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of the posts and roles. Read More... |
Perimeter Security
Bill Booth Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Read More... |