Best Practices - page 3

// by Homeland Security Today

Getting Ahead of the Impact: Emergency Preparedness Key to Biodefense

The more prepared we are, the faster and better we will respond. Of course, budgets are finite and we cannot possibly prepare for every contingency. Prudent emergency managers, therefore, often first consider the threat and use that assessment to drive allocation of preparedness dollars. Many of them have recognized that the biological threat fromnature and… Keep Reading

// by Homeland Security Today

Thinking Forward: An Internet of Things Primer for Emergency Managers

The Internet of Things (IoT) encompasses a community of devices and algorithms that gather and share information with each other via the internet. This sharing requires little, if any, human-to-human interaction. Smartphone users can already download mobile apps that fit under the IoT umbrella. Bluetooth enabled cars and remote home monitoring devices, among others, are… Keep Reading

// by Homeland Security Today

Disaster Recovery Begins With Preparedness: How IT Operations Play a Critical Role

History reminds us natural disasters are inevitable. And while they can’t be stopped, there are many ways companies can prepare themselves for when one strikes. Regardless of a company’s size or industry, all businesses must find ways to keep their employees safe while ensuring business processes continue. They need to act quickly. Consequently, having protocols… Keep Reading

// by Homeland Security Today

Unlocking Interoperability: What It Means for Next-Generation Public Safety Communications

“When it comes to real-world disasters, the lack of interoperability typically translates into response agencies not being able to communicate across radio systems.” As director of enhanced 9-1-1 in Lexington, Ky. and nearly 30 years of experience with the Lexington Division of Police and 15 months at the helm of Lexington Enhanced 9-1-1, I’ve seen… Keep Reading

// by Homeland Security Today

It’s Time to Rethink Agencies’ Approach to Cyber Investigation & Response

The recent breach at the Office of Personnel Management (OPM) has garnered significant attention over the past three months – and justifiably so, given the extent and value of the stolen data. However, in many respects, the scope of data loss is the only unique characteristic of this incident. The storyline of the OPM compromise,… Keep Reading

// by Homeland Security Today

Preparedness Insanity: Why We Need to Think Differently About how to Measure Preparedness

Since 9/11, there have been billions of federal grant dollars awarded to state and local governments and an ongoing quest to measure preparedness. Congress, the Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA), the media and the American public have all expressed their desire to understand precisely how prepared we are, and how… Keep Reading

// by Homeland Security Today

Schools … and Security Expectations

Can you think of a place where safety and security is more important than a school? I suppose you could argue things like nuclear power plants, a municipal water supply or an airport. As angry as we may get when security at one of these types of facilities is breached or found to be lax,… Keep Reading

// by Homeland Security Today

Why We Need Disaster Savings Accounts

Every state in the union has had at least one weather related billion-dollar disaster during the 30-year period between 1980 and 2010, according to an article on the Weather Channel’s website. Federal Emergency Management Administration (FEMA) data shows that the number of disasters warranting a Presidential Disaster Declaration jumped from below 50 per year to… Keep Reading

// by Homeland Security Today

New Watermarking Technique Provides Additional Security Benefits in Authenticating Documentation

Data and the protection of one’s identity, assets and confidential material are an ever-increasing concern in an age where the breach of security is becoming commonplace. The importanceof staying one step ahead in protecting one’s image and information is critical, and it has never been easier to manipulate due to ever-changing technology and applications. In… Keep Reading

1 2 3 4 5 13
Go to Top