Despite the growing concern over external cyber-attacks against organisations, no doubt amplified by the media reporting on attacks against well-known companies such as the Microsoft Xbox, eBay and TalkTalk, the reality is that most organisations are more susceptible to inadvertent or malicious disclosure of sensitive information by employees, contractors or visitors than a cyber-attack. This is confirmed by statistics published in the 2013 IBM Global Reputational Risk and IT Study where 43% of C-Level executives were reported as saying that negligent insiders are the greatest threat to sensitive data.
All Blog Posts
All Blog Posts
All blog posts - this category contains all of the blog posts that I have written and published on rossbale.com.
Whom this blog is for
Because building services engineers design a variety of systems within a building; they need to know a little about each system.
As a result, these engineers cannot specialise in everything.
To make matters worse, they have very little help from qualified security professionals, and often have nowhere to turn.
What this blog covers
Consequently, I have broken down the posts on this blog into the following categories:
- Access Control
- Security Design
- Information Security
- Processes and Procedures
- Adding value
- Best Practice
- The Future
- How stuff works
Therefore, this site exists to give engineers vital impartial, help and information they need to design security systems in modern commercial buildings.
In summary, my aim is to help create clear, straightforward security solutions for commercial buildings so that they can save time and win more clients.
In my daily work, I often see that unless there is a client specified system or an existing system being expanded, the security system design risk is transferred contractually to the system integrator installing the system.
This has the potential to negatively impact the reputation of the consultant.
Security systems hold a lot of valuable data that can be used to make better business decisions.
Most organisations, however overlook the value of this data, or simply don’t know that it exists.
A single smart card used for access control, can potentially have several different numbers for that single card. This article provides some best practice guidance to select the correct card number to streamline administration over the lifespan of the card.
Mechanical Keys are no longer the only solution to secure a building. Keys can however, also introduce a major security risk if not properly planned and controlled when specifying security solutions. This article provides five ways to eliminate keys without compromising security.