Sponsored by Fortalice
As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of...
Now that people are aware that information on their cards, and even their passports, can be read wirelessly and remotely, many are looking for ways to protect themselves. Purchasing an RFID blocking wallet (or sleeve, or pouch) is one way. Isn't it?
Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.
What if other people in your organization could help you buy the loss prevention system that you are having a hard time getting approved by your C-level stakeholders?
“If it looks like a duck and quacks like a duck, it’s probably a duck.” We’ve all heard some form of the “Duck Test” before. We use the folksy expression when we want to get to the heart of the matter and clearly describe something for what it is.
Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information as described. How's that for honor among thieves?
There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.
Upon placing an order for a 16,000GS detacher on Alibaba, within 24 hours I received email correspondence from six different suppliers offering to fulfill my order.
Every so often, a simple idea catches the imagination, fervor, and engagement of a group of people and is developed into a successful practice that revolutionizes a business. Electronic article surveillance (EAS) source tagging is definitely one of those.
One day in October of 2017, a man of medium build entered a Rite Aid in one of the nation’s largest cities, approached the register, and demanded cash. As the drawer was being opened, the subject flung himself over the counter, grabbing whatever cash he could.
Download this 34-page special report from Loss Prevention Magazine about types and frequency of violent incidents, impacts on employees and customers, effectiveness of tools and training, and much more.