Search This Blog

Thursday, May 10, 2012

Cyber Criminals are Winning In Losing Economy

Amid the global downturn in the economy, cybercrminals appear to be winning in the war against law enforcement according to a recently released McAfee report.

"We saw the cybercriminals take advantage of economic messaging very, very quickly," said Dave Marcus, director of security research and communications for McAfee Avert Labs. He said cybercriminals are cashing in on consumer anxiety, particularly around the holidays and noted that as more and more people go online looking for better deals, criminals are preying on their inexperience in order to lure them to bogus sites and old-fashioned "get rich quick" scams.

One scam involves online job seekers responding to ads for "international sales representatives" or "shipping managers" being recruited as "cybermules" to launder the cybercriminal profits. "It's not a 'mule' in the traditional drug sense, where they're carrying drugs across the country or across a border," Marcus said, "but they are ultimately lured into what they think is like an Internet sales marketer or an Internet sales manager position." In reality they are laundering funds, putting it through additional hands, so that law enforcement has a few more obstacles in their path toward finding the thieves themselves.

Unfortunately, Internet users are on their own, he said. As governments begin to focus on internal economic hardships, the fight against cybercrime slips further in funding and support. McAfee predicts that in the fourth quarter of 2008 cybercrime will continue to escalate in severity.

According to CNET, McAfee found that there is a shortage of computer specialists in law enforcement. And those who are specially trained are often hired away to high-salaried jobs at private companies. Of the remaining law enforcement, they're often bound to national borders, said Marcus, with international jurisdictional disputes further slowing online investigations.

The McAfee report said Russia and China remain the largest safe havens for cybercriminals, while Brazil and Moldova have become the fastest-growing countries to be most often blamed for cybercrime. Learn more at Millennium Group Access Control

Tuesday, April 17, 2012

Targeting the Consumer

The biggest technology shift in access control and video security in the last 10 years has not been the move to IP/IT devices, which was and still is a necessity. The real change impacting every new product is customer-centric design.

Long gone are the days when manufacturers ventured into the night to provide a service that few people understood and even fewer knew they needed. Today the products that gain the greatest amount of usability are not just because of the technology deployed. Dare I say, they are developed around what the customer is asking for.

Security devices are now just another part of the corporate culture, and the value proposition for access control is now deeply ingrained into both the building administrator and system users. Building administrators know why they want access control and how they want it used, but they aren't ready to take on the task of putting it in themselves. This is, after all, a big investment.

Manufacturers are now starting to realize that the customer drives the business. Long gone are organizations where the primary driving force is a “cool new technology” developed in someone's garage that now needs a market. Today's security market is mature, and manufacturers understand the growing trend to be market-driven. So the question for manufacturers now is, “How do I get closer to what my customer needs?” Some of those answers fall into the IP/IT space.

Consumers are forced daily to learn new technologies in the IP/IT market space. Whether it be a new VoIP phone system, a new wireless system in a campus infrastructure or even just new ways to control information flow on the corporate network, every computer now has a window open to the Internet. The IP/IT market is one of great technological advancements, and there is growing commoditization. The savvy security manufacturer understands that serving the market involves embracing standards and understanding that the end-user can and should know how a security system works.

Once one has come to that realization, development can begin on products that not only gain consumer acceptance by using base technologies already being adopted, but also expands the consumer's options for choosing installation companies. This widens the range of personnel who can administer the system. And the security manufacturers gain by having a much larger resource and talent pool of engineers, marketers and sales personnel to bring the “next big thing” to market.

Is IT/IP a trend? Yes. Are IT/IP devices and policies the number one trend in the market? Not any longer. They are currently just part of the mandatory feature list.

So what is the “next big thing?”

It's the consumer. You are driving the business now. And it's about time.
Learn more at www.millennium-groupinc.com

Friday, March 30, 2012

Planning Hospital Access Control

Hospital security is a unique challenge. Consider the variety of people who make up the typical hospital environment - patients, staff, vendors, physicians, visitors and even their enemies. Consider the place - many different rooms and spaces, high-value equipment, accessibility to drugs, many entrances and ease-of-movement around the building and premises. Consider a typical hospital - an open feeling, many managers, politics, autonomous physicians, and big desires and limited budgets.

It all adds up to a need for different approaches to security. Hospital managers base their security decisions on law, costs, fear of litigation, and to protect their facility's reputation. But the critical assets of a hospital - its people, property, information and reputation - must be protected with good security.

To analyze security needs, begin by listing the departments, reviewing the business culture of the hospital, determining the threat levels in each department, interviewing department heads about threats and crime, and planning possible countermeasures for each department.

Then develop a master plan and review it against a "reality check" on the basis for the plan and the tools that will be needed. Don't forget that you have options in security.

Professionals should look at the threats likely in specific areas:
- the emergency/trauma department (gang fights, vendettas, domestic conflicts, child custody conflicts, VIP patients);
- infant care area (infant abduction, need for CCTV and infant security);
- pharmacy/drug storage area (alarm and access control systems);
- prisoner care area (receiving, elevator lock-off, surveillance, command center);
- operating rooms (access control, delayed egress hardware, CCTV),
- labs (access control, duress alarms, CCTV);
- nuclear medicine area (access control, CCTV);
- geriatric care area (patient locators, CCTV);
- psychiatric care area (lock-down capability, access control, staff duress, solitary room);
- morgue (decedent services area, access control, alarm system, CCTV); and
- PBX area (late-night security, rest room security, door release, duress alarm).

Don't forget such places as the parking lot (lighting, access control, CCTV in stairwells, duress alarm at fee collection booth), food service area (duress alarm), gift shop (burglar alarm, duress alarm) and shipping/receiving areas (CCTV, patrol). And study the threat potential of biohazard waste storage and disposal (CCTV, access control).

New products such as alarm pagers, infant abduction detection systems, patient wandering systems, CCTV video pursuit systems, people trackers and asset protection systems can each enhance hospital security, Norman suggests.

Indeed hospital security is unique, but with good planning, protection of its assets can be enhanced. Learn more at Millennium Group Access Control Systems

Monday, February 27, 2012

How "Security Aware" are you?

See just how "Security Aware" you really are
Do you believe you're a little more Security Aware? Can you identify the threats that exist in your environment and the steps you should take to avoid them? Take the following quizzes and find out.

Wednesday, February 8, 2012

Four Tips to Help Keep Your Computer Secure

1.     Anti-virus. A reliable, effective anti-virus program with the latest updates. Both licensed and free anti-virus software are available. Whichever you use, make sure it scans incoming and outgoing emails for malware.

2.     Anti-spyware. Reliable effective anti-spyware is a must for securing your computer. Both licensed and free anti-virus software, such as Windows Defender, are available.

3.     Two-way Personal Firewall. Two-way personal firewall software monitors network traffic to and from your computer and helps block malicious communications.

4.     Anti-Keylogger software. Anti-Keylogger software products, like AntiLogger and Keyscrambler Personal, help prevent what you type on your computer, especially sensitive information such as the usernames, passwords, and financial information you use in making online transactions, from being hijacked by Bad Guys. Learn more at www.millennium-groupinc.com

Monday, January 9, 2012

Keep your employees motivated with these 4 suggestions

It can often be challenging to motivate employees when you’re running a small business. Resources are limited, and time is incredibly valuable. Incentives are critical when it comes to motivation, however; finding cheap and easy incentives is vital.
There are a number of ways to motivate employees that don’t include things like big bonuses or expensive benefits. A hand-written thank you letter can go a long way when it comes to showing employee appreciation. Here are a few other ideas:

1. Ask for input
It means a great deal to most employees to know that their thoughts and opinions are considered. By asking for input and implementing the best suggestions, you are showing them that you cherish their opinions and that they play a significant role in the company.

2. Change it up
Sometimes boredom occurs when employees fall into a rut. By mixing up their projects and responsibilities, and allowing them to show off their skills, you are likely to spark a little inspiration that wasn’t there before.

3. Focus on a great company culture
Some of the best companies to work at are those that employees feel are unique. Developing a great company culture can actually be quite simple and may help you to find and keep strong employees. A game room where employees can take a break and decompress when they’re feeling burned out can do wonders.

4. Recognize people for a job well done
One of the biggest de-motivators can be toiling away on something and feeling like nobody is even aware of your hard work. For this reason, it’s necessary to let employees know that you recognize their hard work and appreciate it.
Something as simple as discussing their accomplishments at a company-wide meeting or sending around an email recognizing their triumphs can make them feel appreciated. Although they may avoid attention, they will likely be pleased to know that they’re being recognized.
All of these techniques are simple, affordable and can do wonders when it comes to motivating employees. Try out one or two of these ideas to see how they may affect employee morale and motivation. This article was brought to you by Millennium Group, The leader in access control solutions. http://www.millennium-groupinc.com

Friday, December 9, 2011

ATM User Safety Tips

ATM users should be advised about what steps they can take to reduce their risk of getting robbed. While it is unlikely that providing safety tips will prevent any particular robbery, the larger purpose is to change ATM users' habits. Safety tips can be provided through mailings to cardholders, signs posted at ATMs, messages printed on ATM receipts, messages displayed on ATM screens, safety presentations, and public awareness campaigns. Listed below are some standard safety tips for ATM users:

o    Be aware of your surroundings, especially between dusk and dawn. If you notice anything suspicious—a security light out, someone loitering nearby—consider coming back later or using a supermarket or convenience store ATM.

o    If using the ATM at night, take someone with you.

o    Park in a well-lit area as close as possible to the ATM.

o    At a drive-through ATM, be sure the doors are locked and the passenger windows are rolled up.

o    If you withdraw cash, put it away promptly; count it later, in private.

o    Put your ATM card and receipt away promptly; never leave your receipt at the ATM.

o    Keep your PIN secret—don't write it down, and don't share it with anyone you don't trust absolutely. Your PIN provides access to your account.

o    Shield the keypad when entering your PIN to keep it from being observed.

o    Avoid being too regular in your ATM use—don't repeatedly visit the same machine at the same time, the same day of the week, for instance.

ATM users should further be advised to close any vestibule doors securely and not to open doors for others. In addition, signs at ATMs should state that the site is being surveilled by cameras.

Some victims resist during robberies either to protect their valuables or because they believe the offender is about to get violent. Some succeed in preventing the robbery through resistance, while others get injured or killed. Offenders want to get the crime over with quickly so they can escape. Any delay increases their nervousness and, therefore, the likelihood they will become violent. Robbers are usually highly agitated and easily perceive the victim's actions as threatening. Drug and alcohol use will obviously influence their emotional state. Some use violence immediately to preempt any resistance. In cases with multiple offenders, the risk of violence increases because each offender is also concerned about appearing tough and in control to the other(s).

As with other violent crimes, victims should assess the particular situation, taking account of nearby assistance, weapons they are threatened with, offenders' behavior and emotional state, their own defensive abilities, and their own psychological need to resist. Given an imperfect understanding of why robbers become violent, compliance is usually the safer course of action for victims, and the best advice for police to offer. Widespread victim compliance, however, undoubtedly leads some offenders to perceive lower risk and, therefore, increases their ATM robbery rates. Stay safe!

For more information on security and access control please visit our website at http://www.millennium-groupinc.com

Followers

Contact Form

Name

Email *

Message *