Access Control: Gateway for Hackers?

Access Control Systems are being targeted as entry points for hackers looking to steal sensitive data and security professionals need to recognize and respond to this emerging threat. Card based access control systems were developed to protect and monitor visitors from unauthorized access to secure buildings.  While now ubiquitous, card … Read More

IT Security Starts with Physical Security

The protection of physical property includes both technical and nontechnical elements. Many times companies concentrate on one and overlook the other, and its only after a breach that they realize their mistake. The capability to secure sensitive information heavily relies on the ability to secure the facility physically. Controlled access … Read More