Tag: Cyber Security

cyber attacks

Most Organizations Expect Cyber Attacks In 2021

Nearly a quarter of global organizations were hit by seven or more cyber attacks in 2020, according to Trend Micro's Cyber Risk Index.
Axis security systems

End-To-End Solutions Provide Connectivity And Flexibility

In the past, security systems comprised of solutions from multiple vendors may have been an attractive option. Today, end-to-end solutions from a single provider offer many benefits over that model.
cybersecurity trends

Netwrix Reveals 5 Cybersecurity Trends

Netwrix reveals the top five cybersecurity trends for organizations to keep an eye on in the second half of 2020 and beyond.
identity

Identity Is The Only Perimeter And Security Needs To Adapt

In today’s workplace, be it on location or remote, the identity should define where we can go, what we can do, and what we can log in to. Learn how to unify identity management across both cyber and physical access in one place for maximum efficiency.
February 2020 Issue

Facility Executive | February 2020 Issue

The February 2020 issue introduces this year's Facility Executive of the Year. Plus, a look at building envelope issues, workplace redesign, and energy metering.
intercom

2020 SOLUTIONS For FM: Open Architecture For Access Control By Mercury Security

An open architecture model is the lynchpin for adopting the latest technologies in access control to meet the changing requirements facility executives face. A talk with Mercury Security President, Matt Barnette, elaborates on the company’s innovations as well as industry trends.
Managed Services Program

STANLEY’s Managed Services Program

STANLEY technology specialists deliver customized, intelligent automation solutions to resolve security vulnerabilities in near real time
cyber security

Cyber-Smart Strategies For Smart Buildings

In the age of smart buildings, the realm of operational technology needs cyber security equal to those employed for IT systems.
cyber security

DOD, ISA, NEMA Announce Program To Help End-Users With Cyber Security

The proposed facility certification would be a natural extension of the ISASecure® program.
camera range

HD Ultra Camera Range

The HD Ultra camera range comes in three form factors with a variety of mounting options: the HD Minidome, HD Bullet, and an HD PTZ Pendant.
cyber security professionals

Skilled Security Workers Becoming More Difficult To Find

Security teams are understaffed as cyber security skills gap worsens, according to a new Tripwire survey.
cyber demands

Organizations Not Ready To Tackle Cyber Demands

Lack of cyber talent, budget, and operational alignment are top challenges, according to a new report from Deloitte.
data breach

Cybercrime Devastating Threat To Small, Medium Sized Businesses

Half of business leaders say a data breach could end their business, according to a new survey by AppRiver.
cybersecurity

Cyber Security That Focuses On Corporate Culture

The founder of non-profit Cyber Education Foundation asserts that cybersecurity is not one person’s job; rather it should be ingrained in a corporate culture.
firmware updates

Viakoo Automates Firmware Updates

CFUM provides capability across a distributed geography to automatically update firmware on camera devices from one or more vendors.
digital identity management

Digital Identity Management

HID ActivOne is an end-to-end digital ID management and authentication solution for large organizations, securing the identity of people, critical data, and assets with the flexibility of a subscription.
cyber security

The Security Of Security: A Q&A Roundtable

What does adding a digital layer to traditional security look like? And, what is the future shaping up to be for security in the built environment?
IoT security

SecuriThings Delivers IoT Security

SecuriThings delivers real-time security for cloud-connected IoT applications.

Small Business Strategies Against Cyber Attacks

According to the fourth annual Business Owner Survey from Nationwide, U.S. small and mid-sized businesses are less concerned with cyber attacks although the threats remain ever-present.
Insider Threats cyber security

Are Insider Threats A Cyber Security Risk In The Workplace?

In a new study from ObserveIT, the majority of respondents understand the definition of an insider threat, but data shows the risk of insider threats is growing rapidly.
Workforce Shortages Webinar

Worried About Workforce Shortages? Effective Strategies To Stay Ahead

During this free webinar, you'll learn the top 5 strategies that facility maintenance pros are implementing to overcome workforce shortages.
Webinar, Facility Capital Improvements

View This Free Video Webinar: Maximizing Value For Facility Master Planning

A panel of Facility Management leaders discuss long-term planning challenges and answer questions about maximizing the value of conducting a Facility Condition Assessments (FCA).

[VIDEO] Collect Asset Data at the Speed of Walking a Building

AI powered data collection with AkitaBox Capture. Take a picture of the asset nameplate, touch the floor plan to locate the asset and move to the next asset. Save up to 90% of your time in the field with AkitaBox Capture AI.