This message was sent to ##Email##. To advertise in this publication please click here
 
 
Oct. 13, 2020
 
 
IAPSC NEWS
 
 
Analytics: Discovering a World of Possibilities Webinar
Presented by Geoffrey Bauer, PSP, ESS |
Thursday, October 22 | 3 PM (ET)​

Powerful, proactive, and smart surveillance solutions that incorporate video and audio analytics are taking modern security systems to the next level. The ability to recognize and analyze specific physical activities and sounds to trigger alerts is impacting not just the safety and security of business today but also contributing to improved business efficiencies, customer service, sales, profits and more.

With the practicality of analytics expanding at a furious pace, there seems to be a disconnect between the feature/function of an analytic to the design and performance objectives for the client. In this session, Geoffrey Bauer, manager of the A&E program for Axis Communications, will provide insight to operational characteristics of common analytics for security and the transformation for use in business intelligence while providing practical design recommendations to establish achievable expectations with your client and get the most out of the daily use of analytics.

IAPSC Members: FREE
Non-Members: $25

Register Now!

This webinar has been approved for 1 CSC credit hour through IAPSC and 1 CPE credit hour through ASIS.
READ MORE
 
 
IAPSC Annual Conference Update
IAPSC
IAPSC’s 2021 Annual Conference will be held June 7-9 at the Sheraton Gunter in San Antonio, Texas.

IAPSC staff is working closely with the venue to ensure we are proactively following safe meeting practices based on CDC and local guidelines. We look forward to sharing our plans with you. Please stay tuned for more details and registration coming soon! In the meantime, please visit IAPSC’s website for hotel information.

Please contact IAPSC staff via email at iapsc@iapsc.org with any questions.
READ MORE
 
 
PRODUCT SHOWCASE
Introducing Overtur™ from Allegion
Overtur™ is Allegion’s digital environment for simplifying design, specification and management of door openings, including access control, between Divisions 8 and 28. It serves as a central hub of access control hardware information that allows team members to collaborate on a project in a single platform.
LEARN MORE
 
 
Set Yourself Apart and Become A Certified Security Consultant (CSC)!
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination. The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee. Learn more here and apply today!
READ MORE
 
 
FEATURED ARTICLE
Is Your USB Cable Spying on You?
Promoted by Murray Associates
If you have information someone else wants, it is possible. The first malicious USB cable began life as an NSA-created spy tool under the code name COTTONMOUTH in 2008. Back then, the government paid $1,015.00 for one. These days they are available to anyone via the internet for $6.74 to $119.99. They look and work exactly like regular USB cables. They also: extract data, GPS track, audio eavesdrop, and connect via Wi-Fi to a live hacker who may infiltrate your network and plant ransomware. Placement is easy. No one suspects USB cables. Identification is difficult, but not impossible.
READ MORE
 
 
GOVERNMENT
 
 
A 5th of Privileged Users Don't Need Elevated Access
Infosecurity Magazine
Over a third of government and enterprise users have been given privileged access despite not needing it, potentially exposing their organization to greater cyber-risk, according to Forcepoint. The security vendor polled nearly 1,900 privileged users in the U.K. and U.S. to better understand the current risk of insider threats.
READ MORE
 
 
PRODUCT SHOWCASE
 
 
BUSINESS & MANAGEMENT
 
 
Half of All Organizations Experienced Cyber Security Incidents During the Remote Working Period
CPO Magazine
Half of all organizations experienced security incidents associated with remote working during the lockdown period, according to a report by Tessian. The “Securing the Future of Hybrid Working” report also found that phishing remained the most prevalent threat facing employees working remotely. While remote working was a predisposing factor for cyberattacks, the Tessian report found that most employees prefer hybrid working environments, with just 11% exclusively preferring office work.
READ MORE
 
 
Supports IP-based Video Surveillance Systems
With Profile T, ONVIF employs a media service that can support video compression formats, including H.265. The profile is also designed to support audio compression formats, with the ability to include video and audio codecs as needed in the future without having to redesign its media service.
LEARN MORE
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.

Connect with Highly Defined Buyers and Maximize Your Brand Exposure
LEARN MORE
 
 
Security Pros: Cyber Threats to Industrial Enterprises Increase Due to Pandemic
Tech Republic
The pandemic pushed businesses out of their offices, sending employees to work from home (WFH), and opening up hacking opportunities for cyber criminals. A new report from the industrial cybersecurity company Claroty details how U.S. IT (information technology) and OT (operational technology) security professionals see their organization's more of a target since early March, when the US pandemic shut down industry.
READ MORE
 
 
US Ransomware Attacks Doubled in Q3; Healthcare Sector Most Targeted
Health IT Security
The frequency of daily ransomware attacks increased 50 percent during the third quarter of 2020 from the first half of the year, with the US healthcare sector the most targeted globally, according to new research from Check Point. Ransomware attacks on the healthcare sector globally have also doubled.
READ MORE
 
 
IT SECURITY
 
 
61% Microsoft Exchange Servers Are Unpatched, Vulnerable to Attack
Health IT Security
The majority of Microsoft Exchange Servers have yet to be updated with a patch for a critical memory corruption vulnerability reported earlier this year, according to Rapid7. These unpatched servers are highly vulnerable to attack.
READ MORE
 
 
Ransomware Victims That Pay Up Could Incur Steep Fines From Uncle Sam
Krebs on Security
Companies victimized by ransomware and firms that facilitate negotiations with ransomware extortionists could face steep fines from the U.S. federal government if the crooks who profit from the attack are already under economic sanctions, the Treasury Department warned recently.
READ MORE
 
 
TikTok: How a Kids’ Social Media Platform Became a Huge Cybersecurity Problem
David Lukić
TikTok is a huge online social network based around short videos, often contains funny content, and is very popular among children. This popularity among a younger generation has made it a target for a lot of different scams. It’s prone to security issues, but this is not helped by the fact that people suspect the brand itself of spying on people.
READ MORE
 
 
IAPSC News
 
Connect with IAPSC
LinkedIn Email
Dennis Hall, Director of Publishing, 469-420-2656 | Download media kit
Jacqueline Hansen, Content Editor, 469-420-2636 | Contribute news

International Association of Professional Security Consultants
136 Everett Road | Albany NY, 12205 | 415-536-0288 | Contact Us

Click here to unsubscribe.

Learn how to add us to your safe sender list so our emails get to your inbox.
ASSN PNG LOGO
ADVERTISE
SUBSCRIBE
PAST ISSUES
Published by MultiView
Powered by Multibriefs
7701 Las Colinas Ridge, Ste. 800, Irving, TX, 75063