Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.
                    
			            - By Sydny  Shepard
 - Sep 06, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.
                    
			            - By Greg  Robinson
 - Sep 05, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security. 
                    
			            - By Ralph  C. Jensen
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.
                    
			            - By Paul  Garms, Sean  Murphy
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global. 
                    
			            - By Ralph  C. Jensen
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions. 
                    
			            - By Tom  Potosnak
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
                    
			            - By Vince  Ricco
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages
                    
			            - By Ian  Lowe, Mark  Robinton
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another. 
                    
			            - By Travis  Ferry
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used. 
                    
			            - By Ralph  C. Jensen
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality. 
                    
			            - By Scott  Lindley
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    People are fallible creatures. As the saying goes, nobody’s perfect. 
                    
			            - By Jason  Cronk
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data
                    
			            - By Sheila  Loy
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses. 
                    
			            - By David  Pearson
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts. 
                    
			            - By Matthew  Leonard
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals. 
                    
			            - By Julian  Weinberger
 - Sep 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet. 
                    
			            - By Andrew  Jimenez
 - Sep 01, 2018