A waning sign for video cameras on a fence.

Security, Part 10: Your security cameras may be hacked

May 3, 2017


It’s pretty alarming. Right now, you can go to one of several websites and see live streams of hacked cameras. Offices, stores, warehouses, homes, bedrooms, baby monitors – there are thousands of unsecured cameras that have been hacked and are …

Categorized: Security

Download progress bar. Download Files Information Technology Sharing Concept.

Categorized: Security

Cyber security concept: Rear view of businessman standing on wooden floor with circuit board and padlock sketched (chalk drawing) on the wall.

Categorized: Security

Woman puts her finger on an icon of a house shown on the touch screen of a digital tablet. The tablet runs a smart home app. Concept of controlling wireless devices at home, also know as internet of things.

Security, Part 6: The Vulnerability of the Internet of Things

February 8, 2017


In early 2014, more than 100,000 Internet of Things (IoT) devices, including home appliances, were manipulated into sending 750,000 phishing emails over the course of about two weeks, waking the world up to a new threat. The IoT offers promise …

Categorized: Security

Password

Facility Security, Part Five: The Key to Creating Secure Passwords

January 25, 2017


Cybercrime is getting worse every year. One estimate claims that its impact on the world economy is as high as $15 trillion. In other articles, we’ve covered several forms of cybercrime, including ransomware, phishing, visual hacking, as well as threats …

Categorized: Security

Open hand with Internet of Things (IoT) word and icon on blue blur background, Technology concept.

Using the Internet of Things for smarter building use

December 28, 2016


By using smart sensor technology, facility managers can gauge how employees are using available spaces like conference rooms and common meeting spaces. Employee workspaces are increasingly relevant, given today’s trend of more workers making use of flexible work hours and …

Categorized: Security

Index finger touching a locked cloud icon that does link to three office worker symbols in blue. Four unlinked knowledge worker buttons remain gray. Business and technology metaphor. Cutout on white.

Facility Security, Part Four: Network Access Control

December 7, 2016


Mobile phones are everywhere, and the number and types of devices used by employees, customers, healthcare providers, patients, and visitors are growing at a rapid pace. While these devices can be crucial to the functioning of your facility, they are …

Categorized: Security

Laptop computer attacked by ransomware

Facility Security, Part Three: Ransomware

November 9, 2016


  Last month we looked at how to avoid falling victim to phishing scams. This month we take a look at ransomware. Ransomware attacks have been on the rise, especially in the healthcare sector. One study shows there are now …

Categorized: Security

Business executives using computers in office

Facility Security, Part One: Visual Hacking

September 7, 2016


One of the more sinister and successful ways to steal sensitive information is also one of the easiest to carry out. It’s also an approach that remains fairly off the radar for most facilities managers: visual hacking, or basically, walking …

Categorized: Security

OSHA Provides Tools to Prevent Workplace Violence

OSHA Provides Tools to Prevent Workplace Violence

February 11, 2016


With incidents of workplace violence increasing around the country, the need for facilities managers to create and revise Code Silver (active shooter) plans, then practice them with their healthcare facilities staff has become more critical than ever. If you’re stuck …

Categorized: Security