Let’s say the access control system at your organization was hacked, and someone without authorization was able to enter a secure area. Is that a cyber attack, or is it a physical one?
10 Steps to Tabletop Exercise Success
Your BCP was written last year and you were ready for anything! Then COVID-19 happened and you were caught flat footed. The plan didn’t really meet your pandemic needs in … Read more
Fears around bot traffic and bot-powered DDoS attacks persist
Thanks to the proliferation of the Internet of Things, the ability for bots to cause havoc at a global level has increased significantly. IoT devices are susceptible to becoming part … Read more
6 Non-Emergency Uses for Your Mass Notification System
By Jeremy L. Smith, Motorola Solutions – While one of the primary uses of a Mass Notification System (MNS) is for emergencies like evacuations, lockdowns, disaster response coordination, etc., we … Read more