Subscribe: About.com Business Security
http://z.about.com/6/g/bizsecurity/b/rss2.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
business security  business  cameras  full  hire heroes  hire  read full  read  security cameras  security  sensitive information  system  test 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: About.com Business Security

About.com Business Security



Get the latest headlines from the About.com Business Security GuideSite.



 



Penetration Testing: What Is It? Do I Need It?

Mon, 08 Oct 2012 22:44:17 +00002012-10-08T22:44:17Z

A Penetration Test, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organisation. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system... Read More




Security Camera Basics

Sat, 22 Sep 2012 14:03:39 +00002012-09-22T14:03:39Z

Video cameras are a staple of business security. Before you begin a surveillance program, however, you need to consider several technical and policy issues. Before deploying security cameras in your business, there are at least 5 questions you need to ask:

...

Read Full Post




Covert Security Cameras

Fri, 21 Sep 2012 13:52:10 +00002012-09-21T13:52:10Z

A covert security camera can be a versatile tool for loss prevention and investigative reporting. High resolution security cameras can now be manufactured in small sizes, making them easy to hide in some surprising packages. Hidden cameras tend to use wide angle lenses that often only need a pinhole to look through. And as wireless and battery technologies continues to improve, you can free yourself from the restraints of wires when choosing a camera location.

...

Read Full Post




How to Redact a PDF File

Mon, 10 Sep 2012 22:43:13 +00002012-09-10T22:43:13Z

Incorrectly redacting a pdf file can make you look like a dope. Worse, it can expose sensitive information to public view. You'd be surprised how many people make this rookie mistake when publishing sensitive information. Don't be one of them. Read more...




Securing Houses of Worship

Thu, 06 Sep 2012 23:43:02 +00002012-09-06T23:43:02Z

James McGowan points out that, "As a group churches are considered high risk by insurance companies, and it is reflected in their soaring premiums." There are many factors that make churches particularly vulnerable to loss. Fortunately, there are also some basic practices that church administrators can implement to improve security. Read more...




Security Experts Recommend Disabling Java Now

Thu, 30 Aug 2012 11:02:27 +00002012-08-30T11:02:27Z

Sophos Labs recently snagged a malicious email that exploits a security flaw in Java. This would be a good time to remove Java from your system, or at least downgrade to version 6.

...

Read Full Post




CyberLock

Tue, 28 Aug 2012 23:55:46 +00002012-08-28T23:55:46Z

With the CyberLock system, engineers at Oregon based Videx have taken the credential, controller and power supply of a typical access control system and combined them all into a compact, hand held key. The key, rather than a separate controller, carries all of the programming for the system.

...

Read Full Post




Hire Our Heroes

Wed, 22 Aug 2012 22:25:42 +00002012-08-22T22:25:42Z

Founded in 1957, Allied Barton has become America's largest contract security firm. They've now adopted a company-wide hiring initiative called Hire our Heroes.

Hire our Heroes is a program designed to hire military personnel transitioning into civilian life, as well as ensuring that supervisors have the tools they need to effectively manage employees serving in the Guard and Reserve.

...

Read Full Post




Starting Your Business Continuity Plan

Thu, 16 Aug 2012 12:00:17 +00002012-08-16T12:00:17Z

The first World Trade Center bombing in 1993 closed 350 businesses. 150 never re-opened. Other events such as widespread illness, vendor shut-downs, floods, earthquakes and fires can shut your business down as well. The question is, How quickly could you get back to work? Here is what you need to know about starting a Business Continuity Plan...Read More




Online Banking Security

Wed, 15 Aug 2012 22:23:15 +00002012-08-15T22:23:15Z

Sending your bank transactions surfing across the web can be as hazardous as piloting a ship through pirate-infested waters. Here are seven best practices for online banking security. Read More...