Azu
32 posts
12 Guides on How to Conduct a Tabletop Physical Security Exercise
A tabletop security exercise is a discussion based interactive session where stakeholders meet in either formal or informal…
Physical Key Management Practices for Organizations
Physical key management is important in today’s business world, although oftentimes overlooked and approached with levity. Effective key…
Social Engineering Attack – What Your Organization Should Know
Social engineering is a human threat vector from cybersecurity point. It simply means the criminal action of exploiting…
Emerging Trends in Physical Security
Contemporary physical security is concerned with traditional security roles, assets protection, and loss prevention. All services are offered…
Security Implications of Dark Web
Dark web is one of the three layers of web on the world wide web; other are surface…
Five Sources of Workplace Violence and How To Prepare For Its Prevention and Response
Workplace violence is an inevitable security risk which your organization should get ready to deal with. Having emergency…
4 Types Of Phishing Attacks And 10 Signs To Know A Phishing Email
Phishing is a type of social engineering attack built on manipulating and deceiving people to reveal confidential and…
Travel Security Understanding TSA Approved Locks
Travel security refers to measures taken by an intending traveler to ensure protection for self and luggage. In…
13 Benefits Of CCTV To Your Organization
CCTV surveillance system has proven to be a high value tool for safety and security as well as…
20 Safety and Security Tips For Hotel Guests
Hotel is known for leisure and pleasure. It is a place where people run to when there is…












