Information Holidays from Security ManagementGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-12-22T05:00:00ZSM Staff<p>​The <em>S</em>ecurity Management team wishes you a happy holidays! Our office is closed from Monday, December 25 through Monday, January 1. Come back January 2nd to see new updated content. </p>

Information Holidays from Security Management Entries Spotlight Innovation Online February 2016 Online October 2015 News September 2015 Wanted: Computer Bugs Online May 2015 Denied Safer Frontier News September 2014's 2014 Data Breach Investigations Report Breach Victims Control’s Future Is Now Crime, Security and Digital Intelligence 2014 Security Threat Report Espionage: Developing a Counterespionage Program XP Goes Dark Experts Talk Trends Cyber Risk New Digital Age: Reshaping the Future of People, Nations and Business

 You May Also Like... in Shared Spaces<p>​Coworking spaces  are on the rise around the globe. These flexible work settings allow people without a traditional office building to still enjoy many of the amenities that come along with having a dedicated work environment. </p><p><em>The 2017 Global Coworking Survey</em>, conducted by Deskmag, along with, found that there are an estimated 13,800 active coworking spaces worldwide, hosting more than 1 million people. </p><p>This represents a major increase from five years ago, when just 2,070 coworking spaces were used by 81,000 people globally. COCO, a coworking company based in St. Paul, Minnesota, offers several different levels of membership and types of space, so clients are only paying for the amount of time they need and space they require, says Megan Dorn, director of operations at COCO. </p><p>“Our idea in doing that was to be with our clients as they grow—from the beginning of their business, to hiring employees, to maybe needing private offices—which we also have,” she says. “So that’s what makes us a little bit different than your typical coworking space.” </p><p>When the company started in 2010, it had to distribute physical keys to its members, “which is a nightmare as you’re trying to grow,” she notes, and a security concern if a key was ever lost. </p><p>Because COCO normally leases its space in a larger building, it needed a security solution that was as flexible as the working environment it provides. “We usually have to find ways—when we’re opening a space or acquiring a space—to work with the building to find ways to get our security system installed,” Dorn explains. </p><p>When COCO acquired a new space in Chicago last May, the existing security system was a door locked by a PIN code, which the building never changed. The PIN code was distributed to a large number of people.</p><p>“The space got broken into a week before we acquired it. Laptops were stolen, and people were really on edge,” she notes. “So as soon as we came in to the Chicago space, one of our top priorities was to get a really solid access and security system in place.” </p><p>COCO turned to Brivo’s OnAir, a cloud-based access control system that easily integrated into the company’s membership dashboard, called Bamboo. Using Brivo, COCO can easily distribute keycards to its clients and manage membership usage and levels. </p><p>To set up the system, Brivo representatives come to COCO’s space and add card readers to the appropriate doors. They also set up schedules and the different access levels for membership types.</p><p>COCO has one membership accountant who works out of the company’s headquarters and oversees assigning new members a keycard number through Brivo. “It’s all digital, so it can be done remotely,” she notes. </p><p>A community manager at the member’s location—the lead COCO employee for that site—can then log on to Brivo and see which card number has been assigned for that client, add the number to their member profile in Bamboo, and distribute it. </p><p>Changing, granting, and revoking access levels, as well as keeping track of when members come and go throughout the building, are all managed through the Brivo platform. </p><p>“Say you want to upgrade a member from part-time to full-time. We’re able to just go into Brivo and quickly change your access. It’s active the moment that you do it,” she notes. “That’s actually been really helpful for us, given we have all this variability in types of membership.” </p><p>When a member badges in, a wealth of information comes up on the Brivo dashboard for the community manager to see. “Their picture, their name, their membership level, how many times they’ve checked in already that month, it immediately shows up,” she says. “So it tells you in real time exactly who’s in your space and when.”</p><p>The business value of OnAir is immense for COCO, Dorn points out, because the company can tell how often members are actually using the space, and whether they have made payments, as soon as they present their access card to the door reader. </p><p>“Let’s say someone is delinquent on payment. As soon as the member checks in, there’s going to be big red circle with an exclamation point [on the dashboard]–you can’t miss it,” she says. “It’s definitely helped us lower the sheer amount of delinquent payments that we have, and receive that payment.”</p><p>When a member badges in, Brivo also alerts the community manager if that person hasn’t been in the space very often that month. </p><p>“If we can find a member who we consider at-risk, who hasn’t been using the space, and we’re alerted to that we can reach out to them, invite them to an event, or try whatever we can to reengage them,” Dorn says. </p><p>COCO is also in the initial stages of using Brivo MobilePass, which lets COCO staff remotely lock and unlock doors via a smart device, for members who want to access the space after-hours but forget their keycard. </p><p>Because of how easily it can deactivate and reactivate access, COCO also encourages members who leave the company to keep their keycards. </p><p>“The goal is to try to get the member to come back. So if you have that card and you come back, you’re already set up in our system, all we have to do is reactivate the card and then we’ll also waive any setup fees,” Dorn says. </p><p>She notes the combination of security and business insights from Brivo has been tremendous for COCO. </p><p>“Brivo as a security system has helped us go from being a group of people working out of a space to a full-fledged company,” she says. “It really helps us manage all of the different types of membership and the stages of business they’re in.” </p><p><em>For more information: Nicki Saffell,,, 301.664.5242 ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Executives at Home<p>​</p><p dir="ltr" style="text-align:left;">Maybe it's temporary copycatting, or it could be a new trend, but more and more executives and other high-profile figures are experiencing protest attacks at home.</p><p dir="ltr" style="text-align:left;">In just the first five months of 2017, protesters have gathered outside the homes—not offices—of the following U.S. executives, political leaders, and other prominent persons:</p><ul dir="ltr" style="text-align:left;"><li>Wells Fargo CEO Tim Sloan</li><li>Facebook CEO Mark Zuckerberg </li><li>U.S. Bank CEO Richard Davis</li><li>Robert Mercer, co-CEO of hedge fund Renaissance Technologies</li><li>Ivanka Trump</li><li>U.S. Senator Mitch McConnell</li><li>U.S. Representative Maxine Waters</li><li>U.S. Federal Communications Commission Chairman Ajit Pai</li></ul><p dir="ltr" style="text-align:left;"><br></p><p dir="ltr" style="text-align:left;">Protests at executives' homes are wildly unpredictable in their timing and other characteristics. Throngs ranging from a dozen to hundreds of protesters may appear overnight after a news report or a social media posting. This can happen despite the real possibility that the account that led to the protest is inaccurate, exaggerated, or even completely false. </p><p dir="ltr" style="text-align:left;">Regardless, spontaneous mobs or paid protesters may show up at an executive's house to express their displeasure, disturb the neighbors, block access to the home, and frighten the home's occupants by bombarding them with chants, signs, and angry marchers. </p><p dir="ltr" style="text-align:left;">One client of ours was targeted at home by protesters opposed to his company's marketing, which appealed to children. The protesters' presence and aggressive tactics caused the executive's special-needs son to panic and attempt to escape the home from a second-story window. Protests at homes are not always innocent. They are sometimes belligerent and can lead to bad outcomes for the family or the protesters. </p><p dir="ltr" style="text-align:left;">What can a security department or its executive protection division do to minimize the potential harm to executives (a duty they owe to those important, exposed employees) and even to protesters (whose injury could lead to bad press for the company)? </p><p dir="ltr" style="text-align:left;">The answer is anticipation and preventive measures. As for anticipation, one of our clients, a large multinational corporation, takes special efforts to track mentions of the company and its executives—not only in news sources but also in social media. The company's intelligence team also joins the distribution lists of adversarial organizations and, when possible, uses geofencing to monitor social media activity that mentions executives' homes or originates near them. Staff members also conduct research on the specific individuals who make potentially threatening comments online to gauge their possible dangerousness. </p><p dir="ltr" style="text-align:left;">In addition, it makes sense to delist the executive's home phone number to minimize the risk of abusive calls and to make it harder to find the executive's address. Delisting is difficult and not reliably permanent, but it is worth a try. A dedicated adversary may still be able to find the phone number and address, but there is no reason to make the task easy, especially for less-organized, spur-of-the-moment, or unbalanced persons. </p><p dir="ltr" style="text-align:left;">This anticipatory work, along with planning, makes it possible to implement special measures quickly when risk spikes. The following are some of the measures security personnel can put in place when they detect a plausible risk of protests at an executive's home:</p><ul dir="ltr" style="text-align:left;"><li>Provide security driving services to the executives and possibly to members of their families. Protesters may swarm or attack personal vehicles, and a security-trained driver would be better equipped to avoid or otherwise handle such incidents.</li><li>Contract for a law enforcement presence outside the executive's home. If the protesters remain on public property and are not violating the law, police may not do anything to protect the executive. However, a police officer in a marked or unmarked patrol car parked in front of the house may help keep the situation from escalating. </li><li>Set up temporary exterior video cameras, viewing 360 degrees outward from the home, to monitor and document protester behavior, especially any trespassing or throwing of projectiles.</li><li>Make sure the home has bright floodlights shining outward at night so protesters cannot easily trespass undetected.</li><li>Remind the family to turn on its security alarm system.</li><li>Consider having the family live elsewhere for a few days.</li></ul><p dir="ltr" style="text-align:left;"><br></p><p dir="ltr" style="text-align:left;">Protests at executives' homes are disturbing and potentially dangerous. They cannot be prevented, but with careful research and planning, they can be managed.</p><p dir="ltr" style="text-align:left;"><em>Robert L. Oatman, CPP, is president of R. L. Oatman & Associates, Inc.</em></p>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Physical Security, Third Edition<div class="body"> <p> <font face="Arial">Effective Physical Security, Third Edition. <font size="2">By Lawrence J. Fennelly; published by Elsevier Butterworth-Heinemann; available from ASIS, Item #1568, 703/519-6200 (phone), <a></a> (Web); 315 pages; $40 (ASIS members), $44 (nonmembers). </font></font>  </p> <p> <font size="2" face="Arial">Asset protection and management pose unique and ever-shifting challenges, but the foundation principles on which these fields are based remain the same. For those basic components of physical security controls, one need look no further than the third edition of this Lawrence Fennelly work. It's a compilation of informative essays written by security professionals expert in various topics.</font> </p> <p> <font size="2" face="Arial">Fennelly provides readers with a quick, easy-to-understand reference on security controls, design, and management techniques. Numerous checklists, definitions, and drawings capture the reader's attention and ensure that each control will be well understood and implemented correctly.</font> </p> <p> <font size="2" face="Arial">New to the third addition are chapters on risk assessment and management, security lighting, entry control, contraband detection, bomb-incident management, and homeland security. These join stalwarts from earlier editions, including worthy chapters focused on locks, alarms, CCTV, and crime prevention through environmental design. The chapters vary in detail, but any security professional would benefit from the collection of knowledge and useful information assembled in this book, especially those seeking the newly launched ASIS Physical Security Professional designation.</font> </p> <hr size="2" width="100%" /> <p> <font size="2" face="Arial"> <em>Reviewer: Cathal Walsh is a security analyst for the global security department of Prudential Financial, Newark, New Jersey. He is a member of ASIS International.</em> </font> </p> </div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465