This message was sent to ##Email##
To advertise in this publication please click here
|
|
|
.IAPSC NEWS
IAPSC
Presented by Duane Reeves
Tuesday, November 17, 3pm - 4pm (ET)
Eavesdropping, surveillance, and espionage isn't just something that happens in the movies. Corporate or economic espionage has become a multi-billion-dollar industry fueled by the marketing of sophisticated spy technology to individuals who are deploying covert technology against one another on an unprecedented scale.
This presentation is designed to introduce you to the world of how insider threats are utilizing electronic surveillance and how this field has affected the way information technology and physical security should conduct security operations.
The Technical Surveillance Countermeasures (TSCM) survey is one of the most under-utilized security assessment services available to security managers. Thus, leaving a void in their overall security programs.
At the end of this session participants will be able to:
• Understand the significance of how insider threats can have on their business.
• Demonstrate that the opportunity for surveillance devices is at an all-time high.
• Define common threats and what the attendee can do to counter those threats.
This webinar has been approved for 1 CSC credit hour through IAPSC and submitted for 1 CPE credit hour through ASIS.
Register Now!
|
 |
|
Overtur™ is Allegion’s digital environment for simplifying design, specification and management of door openings, including access control, between Divisions 8 and 28. It serves as a central hub of access control hardware information that allows team members to collaborate on a project in a single platform.
|
|
IAPSC
IAPSC’s 2021 Annual Conference will be held June 7-9 at the Sheraton Gunter in San Antonio, Texas.
IAPSC staff is working closely with the venue to ensure we are proactively following safe meeting practices based on CDC and local guidelines. We look forward to sharing our plans with you. Please stay tuned for more details and registration coming soon! In the meantime, please visit IAPSC’s website for hotel information.
Please contact IAPSC staff via email at iapsc@iapsc.org with any questions.
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination.
The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee.
Learn more here and apply today!
.GOVERNMENT
Cybersecurity Company Finds Hacker Selling Info On 186M US Voters
CNBC
A cybersecurity company says it has found a hacker selling personally identifying information of more than 200 million Americans, including the voter registration data of 186 million.
The revelation underscored how vulnerable Americans are to email targeting by criminals and foreign adversaries, even as U.S. officials announced that Iran and Russia had obtained voter registration data and email addresses with an eye toward interfering in the 2020 election.
|
|
|
Promoted by Murray Associates
Spies, hackers, terrorists and nosey neighbors are targeting business Wi-Fi big time. And, why not? Business information is valuable, ransomeware pays, and voyeurs seek entertainment. Our 20-point checklist will help you secure your system. Most Wi-Fi systems are sitting ducks, especially with employees working from home. Wi-Fi is used by smartphones, printers, VoIP phones, security cameras, smart TVs, smart speakers and all other IoT devices. Wi-Fi is also the gateway to your network, where everything else can be remotely attacked by outsiders. Additionally, many bugging devices use Wi-Fi…
|
|
|
.BUSINESS & MANAGEMENT
Why is Cyber Security Awareness a Priority in Organizations?
Security Boulevard
For every organization, it is always necessary to maintain proper cyber hygiene. It is also vital for companies to remind their employees of the ongoing danger of cyber violations. Employees unintentionally cause data breaches because of cyber security unawareness which further results in increasing cyber risks.
|
|
|
With Profile T, ONVIF employs a media service that can support video compression formats, including H.265. The profile is also designed to support audio compression formats, with the ability to include video and audio codecs as needed in the future without having to redesign its media service.
|
|
|
|
|
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
.IT SECURITY
Barnes & Noble Hit by Cyberattack That Exposed Customer Data
BleepingComputer
Bookstore giant Barnes & Noble has disclosed that they were victims of a cyberattack that may have exposed customers' data.
Barnes & Noble is the largest brick-and-mortar bookseller in the U.S., with over 600 bookstores in 50 states. The bookseller also operated the Nook Digital, which is their eBook and e-Reader platform.
|
|
MULTIBRIEFS EXCLUSIVE
5 Data Protection Trends of 2020 That Will Define Security Next Year
Richard Conn
As more businesses move online, the field of cybersecurity has grown in importance. Workplace digitalization has led to many changes, including a move to new platforms and strategies. Many companies are adopting a cloud-first strategy, requiring new methods of protecting data. Consumers are more empowered than ever — and they demand transparency and security in how their data is stored and used. Data protection will become vital to an organization’s success.
|
|
Cybercrime Increasingly Converging Towards Ransomware, Cartel Models
SC Magazine
Cybercriminal groups are increasingly gravitating towards ransomware, while evolving more and more towards a cooperative cartel model, according to new research from threat intelligence firms.
In a new report released recently, Mandiant spotlights the evolution of FIN11 — a financially motivated hacking group — from specializing in high-tempo, high-volume malicious email campaigns to a laser-like focus on ransomware and extortion.
|
|
Cybercriminals Are Using Legitimate Office 365 Services to Launch Attacks
Help Net Security
Vectra released its report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks. Attacks that target software-as-a-service user accounts are one of the fastest-growing and most prevalent problems for organizations, even before COVID-19 forced the vast and rapid shift to remote work.
|
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|