Source: US Northwestern University’s Medill Reports
Security measures apparently do little to deter robbers. Of the 7,272 robberies or attempted robberies in the USA in 2006, 98 percent of victim institutions had an alarm system and/or surveillance cameras.
One man accused of robbing seven Indiana banks told a newspaper earlier this month that his only deterrent to robbing banks was security guards – a rare feature today at US banks.
Instead of career robbers, people from many walks of life are gravitating to robbery, ranging from drug addicts to employed middle-class individuals, according to Gregory Scott, professor of sociology at DePaul University, Chicago.
“We’re coming to the end of the really well-plotted, well-organized bank robbery that results from long-term strategic planning. Now we’re talking about lower-level bank robberies,” he said.
Today’s robbers are spontaneous and opportunistic, according to a 2007 study commissioned by the U.S. Department of Justice, which identified three factors contributing to rising robbery rates: more bank outlets and extended hours creating greater opportunities, robbers' perceptions of banks as a lucrative target and because robberies are usually fast, low risk crimes - in the USA 90% of robberies are successful, although 60% of robbers are eventually caught.
Offering the CSMP - Certified Security Management Professional distance-learning award www.ismi.org.uk
Monday, March 31, 2008
Kidnap News
Read about the latest kidnap stories from around the world
at:
http://claytonconsultants.com/e/2008/03/newsletter/KRE-Monitor-Mar-2008.pdf
at:
http://claytonconsultants.com/e/2008/03/newsletter/KRE-Monitor-Mar-2008.pdf
BlackBerry Warning
British businesses are being told to make certain they accurately configure their BlackBerries, or risk reducing their information-technology security levels.
Online security consultancy NTA Monitor states recent testing revealed that companies are still not making sure the smartphones are locked down. It stresses that BlackBerry infrastructure can be breached if no firewalls are utilized to divide the BlackBerry Enterprise Server (BES) router element from the main BES servers on the inside network. If the BES is jeopardized and the BES router is not separate, it can result in the entire network becoming insecure, NTA says.
RIM vice president of global security Scott Totzke, however, notes that while this strategy might benefit certain BlackBerry clients, it is only one way to protect the devices, and that there is not just one solution for all security needs. He explains that the BlackBerry infrastructure has over 400 configurable security protocols, providing clients the ability to reduce their own risk level. NTA Monitor also suggests that BlackBerry administrators shut off Bluetooth, although Totzke points out that the BlackBerry model permits users to turn on parts of Bluetooth and shut off others, which may be the best response.
Source:
http://news.zdnet.co.uk/hardware/0,1000000091,39365233,00.htm
Online security consultancy NTA Monitor states recent testing revealed that companies are still not making sure the smartphones are locked down. It stresses that BlackBerry infrastructure can be breached if no firewalls are utilized to divide the BlackBerry Enterprise Server (BES) router element from the main BES servers on the inside network. If the BES is jeopardized and the BES router is not separate, it can result in the entire network becoming insecure, NTA says.
RIM vice president of global security Scott Totzke, however, notes that while this strategy might benefit certain BlackBerry clients, it is only one way to protect the devices, and that there is not just one solution for all security needs. He explains that the BlackBerry infrastructure has over 400 configurable security protocols, providing clients the ability to reduce their own risk level. NTA Monitor also suggests that BlackBerry administrators shut off Bluetooth, although Totzke points out that the BlackBerry model permits users to turn on parts of Bluetooth and shut off others, which may be the best response.
Source:
http://news.zdnet.co.uk/hardware/0,1000000091,39365233,00.htm
Security Management Access Control Feature: Learn All about Biometrics at Wikipedia!

If you are considering installing biometrics, this is an interesting and useful read.
http://en.wikipedia.org/wiki/Biometrics#_note-jain_short_article
Saturday, March 29, 2008
CPP Certification - A Message from a Very Happy CPP-Certified ARC Course Delegate in SE Asia
"Dear David
Just to inform you that I have obtained all the CPE credits required for the three-year recertification term by just attending one ARC security management course. This is a great seller for any CPP holders who want to obtain all the points in the cheapest way possible.”
Just to inform you that I have obtained all the CPE credits required for the three-year recertification term by just attending one ARC security management course. This is a great seller for any CPP holders who want to obtain all the points in the cheapest way possible.”
Data Security - Encryption Keys Can be Compromised for Several Minutes after Switching off Computers, Scientists Find

It was previously thought that data held in so-called "volatile memory" was only retained for a few seconds after the machine was switched off. But the team found that data including encryption keys could be held and retrieved for up to several minutes.
"The real worry is that someone will get hold of your laptop either while it is turned on or while it is in sleeping or hibernation mode," said research scientist Professor Felten.
Camera that "Sees" Through clothes Developed

The T5000 camera uses what it calls "passive imaging technology" to identify objects by the natural electromagnetic rays - known as Terahertz or T-rays - that they emit.
Read on at:
http://www.itpro.co.uk/security/news/176037/camera-that-sees-through-clothes-developed.html
Subscribe to:
Posts (Atom)