8 steps to a physical security strategy

In the digital era, where cyber threats often dominate headlines, it’s crucial not to overlook the significance of physical security for UK businesses. Protecting tangible assets, from human resources to infrastructure and equipment, is equally vital. Here are the key elements of physical security that UK businesses should prioritise… Access Control: Doors and Locks: Sturdy […]
Total Security Summit: Full speaker line up confirmed

There are limited free spaces left to next month’s Total Security Summit, which takes place on 9th and 10th October at the Radisson Blu Hotel Manchester. The two days consist of connecting with like-minded peers, benchmarking new suppliers for your upcoming projects based on your interests and needs, as well as a seat at all […]
Understanding Internet Protocol Security (IPsec): An introduction for businesses

With businesses increasingly relying on interconnected systems and the internet to operate, the security of data transfers is paramount. Internet Protocol Security, often abbreviated as IPsec, plays a vital role in ensuring that information exchanged over IP networks remains confidential and secure. Here’sm what you need to know… What is IPsec? IPsec is a suite […]
Do you specialise in IP/IT Security? We want to hear from you!

Each month on Security Briefing we’re shining the spotlight on a different part of the security market – and in September we’ll be focussing on IP/IT Security. It’s all part of our ‘Recommended’ editorial feature, designed to help security buyers find the best products and services available today. So, if you’re a supplier of IP/IT Security […]
Study show generative AI now an ’emerging risk’ for enterprise

The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023. “Generative AI was the second most-frequently named risk in our second quarter survey, appearing in the top 10 for the first time,” said Ran Xu director, research in […]
University of Glasgow tackles thermal attack personal data threat using AI

A team of computer security experts at the University of Glasgow have developed a set of recommendations to help defend against ‘thermal attacks’ which can steal personal information. Thermal attacks use heat-sensitive cameras to read the traces of fingerprints left on surfaces like smartphone screens, computer keyboards and PIN pads. Hackers can use the relative […]
Best practice for sourcing biometric security for your business

Biometric security is becoming an essential part of modern access control systems. By using unique physical characteristics such as fingerprints, facial recognition, or iris scans, biometric systems offer a higher level of security. Here are key considerations when sourcing specialist biometric security suppliers for your business… 1. Understanding Your Security Needs: Determine the specific security […]
The Essentials of Physical Security: The 8 pillars of a basic strategy

In a world where cyber threats garner much attention, the significance of physical security in safeguarding businesses cannot be understated. Physical security involves the use of multiple layers of protective measures to ensure the safety of personnel, assets, and information. This primer aims to detail the key aspects of physical security… 1. Physical Barriers: The […]
Enhancing physical security at your business with biometric solutions

In the quest for a secure yet user-friendly access control system, businesses are increasingly turning to biometrics. These solutions utilise unique physical or behavioural attributes — such as fingerprints, facial features, or voice patterns — for identification and access control. Here’s why implementing them can improve your business’s security landscape… Enhanced Security: Biometric characteristics are […]
Is Microsoft Teams a cybersecurity weakness for you organisation? This research thinks so

A survey has found that cyber decision makers are overconfident in the readiness of their organisations to combat cyberattacks via collaboration tools. Collaboration Security: Risks and Realities of the Modern Work Surface, conducted by Mimecast, reveals that businesses are failing to provide dedicated training on collaboration tools, even though almost all (93%) have experienced a […]