Top Ten Security Threats to the Utilities Industry

Posted by Samantha Dutcher on Mar 23, 2011 3:46:00 PM

In 2010, Internet/Intranet Security was the security threat of greatest concern in the Utilities industry. Workplace Violence Prevention/Response and Business Continuity Planning/Organizational Resilience tied for 2nd place. Employee Selection/Screening dropped from 3rd to 4th position and Terrorism dropped from 1st to 5th position in 2010.

1. Cyber/Communications Security: Internet/Intranet Security (including e-mail/e-commerce)
2. (tie) Workplace Violence Prevention/Response
2. (tie) Business Continuity Planning/Organizational Resilience
4. Employee Selection/Screening
5. Terrorism
6. Property Crime (e.g., external theft, vandalism)
7. (tie) General Employee Theft
7. (tie) Crisis Management and Response: Political Unrest/Regional Instability/National Disasters
9. Global Supply-Chain Security
10. Unethical Business Conduct

Click here to download Securitas USA's complete report.

Click Here to download the full report

Tags: utilities industry, blogging, top 10

Top 10 Security Threats to the Information Industry

Posted by Samantha Dutcher on Mar 16, 2011 4:26:00 PM

Internet/Intranet Security and Business Continuity Planning/Organizational Resilience continue to be the security threats of greatest concern in the Information industry in 2010. Internet/Intranet Security remained in 1st position and Business Continuity Planning/Organizational Resilience remained in 2nd position. Business Espionage/Theft of Trade Secrets moved up from 9th position in 2008 to 3rd Position in 2010, while Travel Security moved up from 10th to 4th position.

1. Cyber/Communications Security: Internet/Intranet Security (including e-mail/e-commerce)
2. Business Continuity Planning/Organizational Resilience
3. Business Espionage/Theft of Trade Secrets
4. Travel Security
5. Workplace Violence Prevention/Response
6. Unethical Business Conduct
7. Fraud/White-Collar Crime
8. Identity Theft
9. Intellectual Property/Brand Protection/Product Counterfeiting
10. (tie) Employee Selection/Screening
10. (tie) Executive Protection

Click here to download Securitas USA's complete report.

Top Ten Security Threats

Tags: blogging, Security, top 10, online security

Top Ten Threats for Real Estate, Rental and Leasing

Posted by Samantha Dutcher on Mar 9, 2011 4:27:00 PM

For management security threats in the Real Estate, Rental and Leasing industry, Workplace Violence Prevention/Response remained in 1st place as the security threat of greatest concern in 2010. Robberies moved into 2nd place from 9th place and tied with Property Crime, which moved up to 2nd place from 5th place.

1. Workplace Violence Prevention/Response
2. (tie) Environmental/Social: Robberies
2. (tie) Property Crime (e.g., external theft, vandalism)
4. (tie) Cyber/Communications Security: Internet/Intranet Security (including e-mail/e-commerce)
4. (tie) Environmental/Social: Pandemics
6. Business Continuity Planning/Organizational Resilience
7. (tie) Terrorism
7. (tie) Employee Selection/Screening
7. (tie) Environmental/Social: Shootings (malls, schools)
10. Bombings/Bomb Threats

Click here to download Securitas USA's complete report.

Securitas Free Security Report

Tags: Workplace Violence, blogging, Security, Security Trend Alert, top 10, security threats

Tips for Terrorism Security

Posted by Samantha Dutcher on Nov 8, 2010 5:23:00 PM

Taken from November 2010 Security Spotlight Newsletter

Terrorism Targets

Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom. Terrorists often use threats to:

  • Create fear among the public
  • Try to convince citizens that their government is powerless to prevent terrorism
  • Get immediate publicity for their causes Acts of terrorism include threats of terrorism; assassinations; hijackings; bomb scares and bombings; cyber attacks (computer-based); and the use of chemical, biological, nuclear and radiological weapons. High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, chemical plants, utilities, and corporate centers. Further, terrorists are capable of spreading fear by sending explosives or chemical and biological agents through the mail.

Homeland Security Begins With Hometown Security

The Justice Department recently launched the Nationwide SAR (Suspicious Activity Reporting) Initiative—NSI—a program that sets up “fusion centers” where reports of suspicious activities made by citizens and local police are collected and analyzed. NSI establishes a uniform process for gathering and sharing information among federal, state, local and tribal agencies with the aim of detecting underlying patterns of “precursor conduct”—activities that may signal a potential terrorist attack. The public plays a large part in the NSI program. Authorities are depending upon ordinary citizens to provide the dots to connect. As Department of Homeland Security Secretary Janet Napolitano put it, “Homeland security begins with hometown security.” But what exactly should the public be looking for?

See Something, Say Something

Certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high-profile sites or places where large numbers of people gather. The FBI urges citizens to keep an eye out for such precursor conduct—like that listed below—and to report it immediately.

Surveillance: Are you aware of anyone recording or monitoring activities, taking notes, using cameras, maps, binoculars or other observation equipment near a key facility? Deploying Assets: Have you observed abandoned vehicles, stockpiling of suspicious materials, or persons being deployed near a key facility?

Suspicious Persons: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment, or near a key facility?

Suspicious Questioning: Are you aware of anyone attempting to gain information in person, by phone, mail, email or other communication method regarding a key facility or its personnel?

Acquiring Supplies: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunitions, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility, or to legally obtain items under suspicious circumstances that could be used in a terrorist act?

Dry Runs: Have you observed any behavior that appears to be preparation for terrorist activity, such as mapping out routes, playing out scenarios with other people, monitoring key facilities, timing traffic lights or traffic flow, or other suspicious activities?

Tests of Security: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility or event? Recognizing and reporting precursor intelligence-gathering activities can interrupt potential terrorist events, crimes and other threats before they occur. While on the job, security officers should follow post orders for reporting suspicious activity. Otherwise, the FBI encourages citizens to contact local police, the FBI or the nearest Joint Terrorism Task Force (JTTF) to report suspicious activity or behavior. If there is an emergency or immediate threat, call 911.

For more information on the NSI program go to http://nsi.ncirc.gov/.

For additional resources on detecting and reporting indicators of terrorist attacks, and for guidelines on preparedness and response to terrorism threats, visit
www.fbi.gov
www.dhs.gov
www.fema.gov/pdf/areyouready/terrorism.pdf

Tags: terrorism, blogging, Security, safety tips

Security is a Major Consideration in Parking Lot Choice

Posted by Tim Keller on Jul 2, 2010 9:49:00 AM

According to a recent survey by Federal APD, Security was ranked as the second most important factor (29%) when choosing a parking location. Cost was the leading factor with 34%.  Interestingly, Security ranked number one in two age groups: Over 65 and 25-34.

Read the article in the FaciltyBlog here.

Tags: blogging, Security, Parking