Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 38, No. 5, May

Access Control
Focus on the Family (FF) promotes family values by disseminating information on marriage, parenting, and similar issues. Not everyone agrees with the ideas the association espouses, so when the group moved from California to Colorado Springs, Colorado,...
An Eye on E-Mail
E-mail is becoming an indispensable tool for business communications, and yet it can create new security problems with regard to the protection of proprietary information. That's why one company, Techmatics, a naval engineering firm in Fairfax, Virginia,...
Countering the Threat of Espionage
THE STUNNING RAPIDITY OF THE changes witnessed in the world order have not altered the basic premise that information for countries or corporations is the key to competitiveness and survival. The methods and techniques used to protect this information--counterespionage--have...
Daylight Savings
Businesses that believe after-hour locks and alarms alone secure their building from intruders may be leaving themselves open to burglary. Would-be thieves are entering offices during working hours and hiding in rest rooms and other inconspicuous areas...
DIS Enhances Data Distribution
The Defense Investigative Service (DIS) has the responsibility for administering a variety of programs. While work in these programs has been increasing, the number of personnel has declined. Improvements in efficiency are necessary to allow DIS to remain...
Does Regulatory Compliance Provide Serious Security?
IN THE BANKING AND financial industry, it is said that if you are in compliance, you are secure and in control of your institution's assets. Nothing could be further from the truth. During the heyday of compliance, enforcement by the Federal Deposit...
Fax Attack: Who's Getting the Message?
Basic fax communication can be scoured by adding three features to a fax network. ACCORDING TO THE FEDERAL Communications Commission and telecommunications carriers, the ultimate responsibility for protecting information transmitted over carrier systems,...
Halting History's Disappearance
IN FEBRUARY 1992, BETWEEN 9:00 a.m. and 11:30 a.m., a soldier's diary was stolen from an unprotected display case in the Battlefield Visitor Center at Little Bighorn National Battlefield. The diary, valued at $70,000, was originally found on the body...
Intelligence Policy in a Changing World
DURING THE COLDER DAYS OF THE COLD war, the countries with the largest quantity of the deadliest weapons won the distinction: Superpower. Today, capturing the title hinges on economic strength. Business competition is fierce, and the team with the brain...
Safe Lock Up
Emil Monda, CPP, senior director of assets protection at Taco Bell, which is headquartered in Irvine, California, says that accountability reduces losses. Based on that premise, his company recently began testing safes equipped with an electronic lock...
Securing Safety Policies through Self-Inspection
LIKE A WELL-INTENTIONED PERSON whose heartfelt New Year's resolution never quite takes hold, some companies craft elaborate safety policies that have little impact on work routines. It is security's job to make sure that the organization is true to its...
Securing the Little Nell
THE LITTLE NELL HOTEL, A TOP-notch ski lodge nestled at the base of Aspen Mountain in Colorado was awarded the American Automobile Association's Five-Diamond Award in 1992 and 1993, an award that only forty hotels in the United States hold. Guests note...
Uncovering a Trail of Sheer Treachery
AL FINISHED REVIEWING the company's bid on the new avionics system for the U.S. Air Force. Everything looked good. The new process developed by the engineers in R&D would save thousands of dollars per unit in manufacturing costs. The company stood...
Who's on the Line?
System administrators constantly fight the battle between convenience and security. IN TODAY'S FAST-PACED AND information-based business environment, companies communicate via cellular phones, faxes, and internal telephone systems, including private...