SECURITAS SECURITY SPOTLIGHT
Security in Cyberspace
Any company or individual connecting to the Internet is vulnerable to attack. Some cyberattackers search for and use any unprotected system as a staging point from which to launch a virus. Others look to steal proprietary information and use it for profit.
There are some fundamental ways to protect your network from such attacks.
First, use anti-virus software. Installing anti-virus software and updating it regularly are among the best defenses against cyberattacks.
How to Protect Yourself
Install a firewall. A firewall is a software program that examines information coming into and leaving the network and only allows
Stay current. Keep up to date with software upgrades and security patches. Download fixes as soon as they are available. And always back up your data.
Be an educated user. You can follow some simple procedures to remarkably reduce the level of vulnerability to cyberattacks.
Look out for e-mail attachments. One method for spreading computer viruses is to hide them in attachments. Never open e-mails from anyone you don’t know. To be even safer, scan attachments with anti-virus software before opening them.
Log off. Shut down when you are done for the day. The system is most vulnerable when connected to the Internet.
Pay attention to passwords. Passwords are essential to maintaining network security and protecting personal and company information from prying eyes. Poor passwords are often the weakest link in Internet security; they provide an easy way for hackers to access your company’s network to unleash a virus or access sensitive material.
A Multi-Layered Defense
The best defense against Internet security threats is multi-layered. It involves the technical solutions and user techniques previously discussed. However, it also involves professional security officers providing access control —keeping unauthorized persons out of restricted areas like computer rooms, observing and reporting security breaches such as passwords in plain sight or unattended computers left logged on to the network, and monitoring and recording all computer equipment taken off-site.
Internet security is like a game of cat and mouse. Cyberattackers try to find new ways to breach networks and businesses employ better safeguards to stop them. Who’s winning at your site?
Last Updated (Wednesday, 12 June 2013 13:05)
INTERNATIONAL OBSERVATORY ON ILLICIT TRAFFIC IN CULTURAL GOODS
Wishing to further contribute to the advancement of the fight against illicit traffic, the International Council of Museums (ICOM) has launched a long-term and innovative instrument:
One of the aims of the Observatory is to provide a comprehensive database of resources to experts and non-professionals:
Last Updated (Wednesday, 12 June 2013 13:46)
Movie patrons pursue wrongful death claims after deadly shootings
Traynom v. Conemark USA Inc., No. 12-2514 (U.S. District Court for the Distric of Colorado Apr. 17, 2013) - Source Security Law Newsletter
A federal trial court allowed movie patrons who were injured after a mass shooting at a theater to pursue wrongful death and personal injury claims based on premises liability when it was found that the gunman entered the theater through an unlocked side door.
The theater had off-duty police officers serving as security during weekend and evening shows. A rear door in the theater was unlocked, unmonitored, and did not have an alarm to prevent re-entry. The gunman left the theater to put on body armor, came back in, then left and re-entered again with an assault rifle, shotguns, several rounds of ammunition, and tear gas cannisters. At no time was he approached by a theater employee. Seventeen people were killed and many more injured. Theater employees took no action to evacuate the theater after the shooting or to assist injured patrons.
The District Court held a genuine issue of fact existed as to whether the theater acted reasonably in protecting theater goers and in implementing a rapid safety and exit plan during an emergency.
At IFCPP's Annual Conference (August 3-7, 2013) in San Diego, CA, special sessions on protection during special events and protection in public venues will be presented. Special event security philosophy has remained pretty much the same, until events such as the theater shooting, and the bombings at the Boston Marathon. Additional measures and advanced tactics are called for. Join the discussion group and hear the advice of seasoned professionals at IFCPP 2013!