• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Sitemap
  • About
    • Contact

Business Security Information

Helping You Protect Your Business

  • Physical Security
  • Computer Security
  • Fraud
  • General Security
  • Reviews

Benefits of Physical Access Control in Providing Office Security

August 7, 2014 By Sean Leave a Comment

The need for physical security in any workplace has always been crucial in the world of business. But there are varying methods and legacy technologies in use today that provide only a sense of security and very little actual protection. While security programs for computers and networks are well-documented, there is often little attention paid […]

Filed Under: Physical Security Tagged With: Access Control, Business Security Issues, Security Breaches, Security Issues, Security Products

11 Key Components of Your Vulnerability Assessment Plan

January 28, 2014 By Sean Leave a Comment

So, instead of paying some third party company big bucks every month to perform a vulnerability assessment for you, you’ve decided to do it yourself. Good for you! Vulnerability assessments, or VAs since acronyms sound cooler and more costly, are an important tool for determining whether or not there are any holes in your digital […]

Filed Under: Computer Security Tagged With: Data Security, Network Security, Online Security, Security Breaches, Security Threats, Security Tools

Business Security: Why Small Businesses Should Take Action

June 28, 2013 By Sean Leave a Comment

With online security breaches becoming increasingly more common, small business owners will need to devote more resources to protecting their data. If personal information is obtained from a business through malevolent means, the business’s reputation will likely suffer. In some cases, security problems can even lead to financial losses that will be hard to recoup. […]

Filed Under: General Security Tagged With: Business Security, Data Security, Information Security, Online Security, Physical Security, Security Breaches, Security Solutions

Why Businesses Should Be Aware of DDOS Attacks

May 17, 2013 By Sean Leave a Comment

To date, there have been many distributed denial-of-service (DDoS) attacks targeting business computer systems.  A DDoS attack is a malicious act often carried out by an outsider or hacker to compromise multiple computers and connections of an organization. Such an attack, which can be directed at any industry, can be crippling to a business’s network […]

Filed Under: Computer Security Tagged With: Attack Method, Business Security, Firewalls, Internet Security, Network Security, Security Products, small business security

7 Reason Why You Need to Monitor Event Logs

March 15, 2013 By Sean Leave a Comment

A million items are logged each day on any single system. You can’t possibly keep up with all that data, let alone perform a thorough review even if your system only logs 1% of that. And that’s why you need to monitor event logs. Event log monitoring is the only practical way to deal with […]

Filed Under: Computer Security Tagged With: Business Security, Data Security, Network Security, Security Breaches, Security Issues, Security Tools

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 42
  • Go to Next Page »

Footer

My Profile

Sean McCreary, CPP, CISSP, CCSP, ARM is both a physical security and a cybersecurity professional. He has over 35 years experience in the security field. Sean is a CPP (Certified Protection Professional), CISSP (Certified Information Systems Security Professional), and a CCSP (Certified Cloud Security Professional) along with holding a variety of other vendor certifications. Beyond his experience he also has degrees in Loss Prevention and Safety, Information System Security, Security and Loss Prevention and Police Science. In addition, he is a weapons, self-defense and Hapkido instructor. Read More…

Security Links

  • CSO Online
  • Kevin's Security Scrapbook
  • Krebs On Security Blog
  • The Disaster Recovery Guide

Security Resources

  • CrimeMapping
  • CrimeReports
  • PCI Info for SMB
  • RXPatrol
  • SpotCrime

© Copyright 2018 Business Security Information · All Rights Reserved · Privacy Policy · Terms of Use · Disclosure · Site-Map · Website Design By Ironclad Tech Services