Physical Security

rssRSS
  • A Collection of Resources on How to Respond and Act on Breaches in Security

    Organizations have a responsibility to protect the data of their customers, employees or other stakeholders. Many must comply with industry requirements or government regulations to protect facilities and assets. This guide provides resources to protect...
    By Chris Orr October 31, 2011 

  • How to Develop and Implement a Cyber Security Strategy for Your Business

    Cyber security measures are the sum of what an organization or a user does to secure the computing network and resources from external and internal threats such as unauthorized access, data theft and more; and maintain data confidentiality and integrity...
    By N Nayab October 18, 2011 

  • Developing A Plan to Keep Your Building Secure

    Putting in place private security forces and security devices does not fully guarantee the safety of customers, employees and property. Hence, business organizations are advised to assign the task of monitoring these measures to experts who have adequate...
    By ciel s cantoria August 22, 2011 


  • Identification and Authentication by Means of Biometrics

    Biometrics usually refers to an individual’s unique physiological properties as characteristics, and to the different uses of biometric devices in automated recognition processes for identification, authentication and verification. How do we see...
    By Mark Muller August 8, 2011 

  • The Ongoing Debate Surrounding Biometric Security

    Biometric security measures are in widespread use, yet many issues are still debated - including privacy concerns. In this article, we are going to discuss the advantages and disadvantages of biometric security measures from both a technical and a social...
    By Mark Muller August 8, 2011 

  • Keeping Track of Employee Work Time - Biometric Software Apps

    Biometrics is an effective tool that can be used for employee time tracking. Issues like “buddy punching” and early clock ins can be eliminated with biometric employee time tracking software and a fingerprint or hand scanner. Discussed are...
    By Sheila Robinson August 7, 2011 


  • Streamline Kiosk Operation with Auto-logon

    Many organizations need shared workstations, kiosks providing general information to most or all its employees. The challenge is getting a network-connected computer to access resources without giving every employee a network login. Auto-logon can help...
    By Tom Olzak, CISSP July 4, 2011 

  • Can Your Building Access Control System Really Be Powered By PoE?

    As you might expect, along with technology that is new to the security industry comes advertising claims and counter claims by various vendors each vying for a prominent spot at the top of the tech-tree. PoE is no exception.
    By Steven Bowcut, CPP July 4, 2011 

  • Adeona to Protect Your Mobile Devices, Workstations and Servers if Stolen

    Adeona is an Open Source software hosted at the University of Washington. This software helps to locate your stolen laptop once it gets on the internet. By installing this software, your laptop beacons to multiple servers giving both the external and...
    By Steve Mallard July 4, 2011 

  • Goverment Scans of the Eye: Do They Work?

    Retina and iris scans seem like something out of a super spy movie. And yes, the government does use these for security purposes. Jump into the world of Austin Powers and find out how it all works!
    By Jean Scheid June 5, 2011 
showing 1-10 of 28 < Previous   |   page: 1   2   3   |   Next >





© Copyright 2016 brighthub.com.