Beyond Print
View SM Online by Past Magazine Issue:
July 2014
SM Online

A Plan to Stem Extremism

Since 9-11, there have been more than 200 U.S.-based al Qaeda violent extremists arrested over a combination of 60-plus attempted and successful plots. In response, the Muslim Public Affairs Council has released the Safe Spaces Initiative: Tools for Developing Healthy Communities to help community leaders prevent extremist ideas from turning into dangerous actions.

    Cybersecurity

    The 2014 Security Threat Report from Sophos explores the latest trends in cybersecurity and the most malicious threats to enterprises, government, and individuals on a global scale. The report looks at risks like targeted threats to financial accounts, Android malware, and the end of support updates for Microsoft’s Windows XP operating system.

      Liability

      A federal court has ruled that the Federal Trade Commission (FTC) can advance with a lawsuit against a hotel group for allegedly failing to safeguard consumers’ personal information. The FTC accused the Wyndham Worldwide Corporation of failing to implement adequate security in its computer system, which led to three data breaches between April 2008 and January 2010.

        CPTED Books

        Two newly updated books on Crime Prevention Through Environmental Design, or CPTED, are available now from the ASIS Store. Look for item #2163, the third edition of Crime Prevention Through Environmental Design by Timothy Crowe and updated by Lawrence Fennelly, and item number #2078, the second edition of 21st Century Security and CPTED by Randy Atlas, CPP.

          Privacy

          Australia has enacted a new amendment that will broaden the definition of personal information and require more transparency from organizations on how that personal information is stored. The new law, The Privacy Regulation 2013, is part of the broader Privacy Amendment Act of 2012 and applies to companies with revenues of more than AUD 3 million that collect information, such as names, contact details, payment information, or other details related to a specific person, for any purpose.

             




            Beyond Print

            SM Online

            See all the latest links and resources that supplement the current issue of Security Management magazine.