Columns

Best Practices - page 2

Placeholder
// by Homeland Security Today

Getting Ahead of the Impact: Emergency Preparedness Key to Biodefense

The more prepared we are, the faster and better we will respond. Of course, budgets are finite and we cannot possibly prepare for every contingency. Prudent emergency managers, therefore, often first consider the threat and use that assessment to drive allocation of preparedness dollars. Many of them have recognized that the biological threat fromnature and… Keep Reading

// by Homeland Security Today

Thinking Forward: An Internet of Things Primer for Emergency Managers

The Internet of Things (IoT) encompasses a community of devices and algorithms that gather and share information with each other via the internet. This sharing requires little, if any, human-to-human interaction. Smartphone users can already download mobile apps that fit under the IoT umbrella. Bluetooth enabled cars and remote home monitoring devices, among others, are… Keep Reading

// by Homeland Security Today

Disaster Recovery Begins With Preparedness: How IT Operations Play a Critical Role

History reminds us natural disasters are inevitable. And while they can’t be stopped, there are many ways companies can prepare themselves for when one strikes. Regardless of a company’s size or industry, all businesses must find ways to keep their employees safe while ensuring business processes continue. They need to act quickly. Consequently, having protocols… Keep Reading

// by Homeland Security Today

Unlocking Interoperability: What It Means for Next-Generation Public Safety Communications

“When it comes to real-world disasters, the lack of interoperability typically translates into response agencies not being able to communicate across radio systems.” As director of enhanced 9-1-1 in Lexington, Ky. and nearly 30 years of experience with the Lexington Division of Police and 15 months at the helm of Lexington Enhanced 9-1-1, I’ve seen… Keep Reading

// by Homeland Security Today

It’s Time to Rethink Agencies’ Approach to Cyber Investigation & Response

The recent breach at the Office of Personnel Management (OPM) has garnered significant attention over the past three months – and justifiably so, given the extent and value of the stolen data. However, in many respects, the scope of data loss is the only unique characteristic of this incident. The storyline of the OPM compromise,… Keep Reading

// by Homeland Security Today

Preparedness Insanity: Why We Need to Think Differently About how to Measure Preparedness

Since 9/11, there have been billions of federal grant dollars awarded to state and local governments and an ongoing quest to measure preparedness. Congress, the Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA), the media and the American public have all expressed their desire to understand precisely how prepared we are, and how… Keep Reading

// by Homeland Security Today

Schools … and Security Expectations

Can you think of a place where safety and security is more important than a school? I suppose you could argue things like nuclear power plants, a municipal water supply or an airport. As angry as we may get when security at one of these types of facilities is breached or found to be lax,… Keep Reading

// by Homeland Security Today

Why We Need Disaster Savings Accounts

Every state in the union has had at least one weather related billion-dollar disaster during the 30-year period between 1980 and 2010, according to an article on the Weather Channel’s website. Federal Emergency Management Administration (FEMA) data shows that the number of disasters warranting a Presidential Disaster Declaration jumped from below 50 per year to… Keep Reading

// by Homeland Security Today

New Watermarking Technique Provides Additional Security Benefits in Authenticating Documentation

Data and the protection of one’s identity, assets and confidential material are an ever-increasing concern in an age where the breach of security is becoming commonplace. The importanceof staying one step ahead in protecting one’s image and information is critical, and it has never been easier to manipulate due to ever-changing technology and applications. In… Keep Reading

// by Homeland Security Today

Moving Beyond Smart Cards for Secure, Reliable Government Authentication

Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget report to Congress on the Federal Information Security Management Act (FISMA) compliance, OMB indicated nearly one-third of federal security incidents could have been prevented by strong… Keep Reading

Placeholder
// by Homeland Security Today

How One Hospital Prepared to Treat Patients with Ebola

In response to the 2014 Ebola epidemic, the largest in history, MedStar Health began a focused program to improve healthcare provider response to patients with suspected or confirmed Ebola infection. While these actions are being taken in response to the recent Ebola outbreak, these practices and procedures also will help protect our staff when treating… Keep Reading

// by Homeland Security Today

Now is the Time to Plan for an Emergency

If recent headlines have proven anything, it’s that organizations never know what’s in store for them. If it’s not the economy or a natural disaster, it could be outright terrorism, whether physical or digital in nature. As the recent Sony hack revealed, even private companies stand to suffer from politically motivated attacks. Both public entities… Keep Reading

// by Homeland Security Today

Computer Forensics Critical in the Trial of Silk Road’s Ross Ulbricht

The ongoing trial of Silk Road creator Ross Ulbricht (a.k.a. Dread Pirate Roberts, or DPR) is not only fascinating, but it will have tremendous implications for criminals in the future. With close to a million registered users on the Silk Road and approximately $1.3 billion in transactions, the government had no choice but to prosecute… Keep Reading

// by Homeland Security Today

Typhoon Haiyan: How Analytics were Used for Disaster Relief

Typhoon Haiyan ripped through the Philippines in November 2013, killing thousands and leaving hundreds of thousands homeless. Within a day, help was on the ground from the International Organization for Migration (IOM), an intergovernmental first response organization. IOM is responsible for managing displaced populations and experienced in managing shelters and coordinating operations efforts in places… Keep Reading

// by Homeland Security Today

Our Electric Substations Need Protection Beyond Fences

On April 16th, 2013, terrorists attacked a substation near San Jose California. For 10 full minutes, snipers fired openly at PG&E’s Metcalf transmission substation. At this point, a plant operator became aware of the shots and contacted the police. Unhindered by guards or police for far too long, theterrorists managed to incapacitate 17 of the… Keep Reading

// by Homeland Security Today

Integration of Airport Checkpoint Security

Aviation is one of the fastest growing industries in the world, with an average increase in passenger numbers of nearly 5 percent every year. It is anticipated that about 3.5 billion travelers will pass through the world’s airports in 2015 — equivalent to about 10 times the population of the United States. But such healthy… Keep Reading

// by Homeland Security Today

The Boston Marathon Bombings: Lessons to Learn From

The April, 2013 Boston Marathon bombing clearly showed how video surveillance can be instrumental in capturing those responsible for terrorist bombings. It also demonstrated how the “shelter in place” tactic was successfully used to limit injuries and fatalities in the aftermath of the twin explosions. Lessons learned from the incident can be applied to future… Keep Reading

1 2 3 4 7
Go to Top
X
X