Tag: information security
Magnet Detection Pioneer Alert Systems Selects CONTROLTEK as Exclusive Regional Partner for North America
CONTROLTEK has recently partnered with Danish technology innovator Alert Systems to expand the availability of booster bag and magnet detectors to U.S. retailers.
“Professional shoplifters, and especially organized retail crime (ORC) groups, have learned to use magnetic detachers to remove EAS tags,” said Tom Meehan, CONTROLTEK’s chief strategy officer and chief Read More
AvePoint and the Centre for Information Policy Leadership (CIPL), a global privacy and cybersecurity think tank, recently published the second annual Organisational Readiness for the European Union General Data Protection Regulation (GDPR) report today. The report tracks GDPR implementation efforts of over 235 multinational organizations.
The GDPR establishes formal regulations around Read More
What is the role of the asset protection department in the event of a cyber incident? It’s true that IT is typically in charge of the bulk of the prevention methods, such as firewalls, endpoint security monitoring, network device configuration, and so on. But an effective cyber security incident response Read More
Professional advancement and building a successful loss prevention career can mean many things to many different people. For some individuals, it may mean reaching a top leadership position at a particular company, perhaps serving as a director or vice president of loss prevention/asset protection. For others, it may involve gaining Read More
Appriss Retail recently announced that it has received ISO 27001:2013 certification for its Information Security Management System (ISMS).
ISO 27001:2013 is an information security standard published by the International Organization for Standardization (ISO), the world’s largest developer of voluntary international standards, and the International Electrotechnical Commission (IEC). Appriss Retail’s certification was Read More
Today’s retailers face a variety of security risks, not least of which is the insider threat of cyber crime committed by employees or temporary staff. In fact, according to Kroll’s most recent Global Fraud & Risk Report, insider or employee data theft is the second-most common type of cyber incident in Read More