TITLE

C Suites at Home and on the Road

AUTHOR(S)
Zalud, Bill
PUB. DATE
June 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p68
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the security for top executives of business enterprises. It highlights the need of the security program designed for the executives to include physical protection, home security systems, as well as reinforced car. It also explores the mistakes of executives while driving which include driving in unfamiliar place, failure to keep safety equipment, and parking the vehicle in dark areas.
ACCESSION #
41522247

 

Related Articles

  • Toward a Unified Security System.  // UN Chronicle;Mar-May2005, Vol. 42 Issue 1, p26 

    The article presents information on the functioning of the Fifth Committee of the United Nations towards achieving a unified security system. The Filth Committee of the United Nations (UN) confines its scope not just to budgetary and administration issues. It also monitors United Nations'...

  • Finding personnel main problem for Puerto Rico's 185 security firms. Casellas, Carmen T. // Caribbean Business;10/10/1996, Vol. 24 Issue 40, p14 

    There are 185 security firms in Puerto Rico, all small businesses. Owners interviewed by the weekly "Caribbean Business" said their main problem is screening candidates for guard positions and developing a system to handle the responsibility protecting people's lives and property entails....

  • Safe as houses. Cohen, Lawrence // Nursing Standard;7/28/2004, Vol. 18 Issue 46, p18 

    Reports on the potential security risks of nurses living in hospital accommodation. Failure to invest in adequate security for staff accommodation; Tips for nurses on staying safe; Emphasis on balancing security and privacy. INSETS: Safety first: available options;Staying safe: ten tips for nurses.

  • The hidden cost of violent attacks at work. Walsh, Noel // Personnel Today;5/2/2006, p17 

    The article discusses strategies for reducing the risk of injuries on security staff involved in violent attacks. Security measures and systems can reduce the risk of injuries to staff. They include the use of highly advanced technology for security vans, surveillance where appropriate and...

  • BACKGROUND SCREEING CAN DIMINISH HIRING MISTAKES. Lashier, Ron // SDM: Security Distributing & Marketing;Oct2006, Vol. 36 Issue 10, p93 

    The article focuses on the importance of conducting employment background screening so that alarm companies in the U.S. can avoid big mistakes. Eighty percent of organizations perform some kind of criminal background check. Employers are driven to background screening by the desire to provide an...

  • Improving the Dependability of an ID Program. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p48 

    The article focuses on the aspects to be considered to improve the dependability of an identification (ID) program. To ensure high quality ID program, the author regards the need to undergo the authentication verification process, requiring the formulation of standard criteria for the collection...

  • Tools of the Master Planning Trade. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p36 

    The article discusses why organizations need a master security plan and how to go about assembling and implementing the plan. Creating a security master plan calls for a lot of homework including the need to know the existing and future needs of the business enterprise. The baselining of current...

  • Reinventing Security. Berg, Chris // Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p30 

    The article discusses the reinvention of the security function on companies in the U.S. It defines the reinvention of security as working through extreme organization alteration or functional flaws to generate a new function that meets the business' needs. It offers four common occurrences which...

  • A security-based agent for a virtual enterprise. Huang, J.; Zhou, Z. D.; Chen, Y. P. // International Journal of Advanced Manufacturing Technology;Apr2004, Vol. 23 Issue 7/8, p620 

    On the basis of an analysis of the differences between virtual and traditional enterprise including the disadvantages of traditional enterprise, this article addresses the issues of information security and the impact of concurrent events. Because the Internet is an open network, some of the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics