Monday October 8, 2012
A Penetration Test, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organisation. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system... Read More
Saturday September 22, 2012
Video cameras are a staple of business security. Before you begin a surveillance program, however, you need to consider several technical and policy issues. Before deploying security cameras in your business, there are at least 5 questions you need to ask:
- How can I monitor my business and still respect employee privacy?
- What are the best locations for security cameras?
- Can I record in direct sunlight?
- What type of recorder should I use?
- What should I look for in a video contractor?
You can dive into each one of those questions here.
Friday September 21, 2012
A covert security camera can be a versatile tool for loss prevention and investigative reporting. High resolution security cameras can now be manufactured in small sizes, making them easy to hide in some surprising packages. Hidden cameras tend to use wide angle lenses that often only need a pinhole to look through. And as wireless and battery technologies continues to improve, you can free yourself from the restraints of wires when choosing a camera location.
A word of caution however... Read More
Monday September 10, 2012
Incorrectly redacting a pdf file can make you look like a dope. Worse, it can expose sensitive information to public view. You'd be surprised how many people make this rookie mistake when publishing sensitive information. Don't be one of them. Read more...