News

U.S. CYBERATTACK HURT IRAN’S ABILITY TO TARGET OIL TANKERS, OFFICIALS SAYLess

U.S. CYBERATTACK HURT IRAN’S ABILITY TO TARGET OIL TANKERS, OFFICIALS SAY

From "U.S. Cyberattack Hurt Iran’s Ability to Target Oil Tankers, Officials Say"

Washington Post (08/29/19) Nakashima, Ellen; Sonne, Paul

From "U.S. Cyberattack Hurt Iran’s Ability to Target Oil Tankers, Officials Say"

Washington Post (08/29/19) Nakashima, Ellen; Sonne, Paul

Less

A secret cyberattack against Iran in June wiped out a critical database used by Iran’s paramilitary arm to plot attacks against oil tankers and degraded Tehran’s ability to covertly target shipping traffic in the Persian Gulf, at least temporarily, according to senior American officials. Iran is still trying to recover information destroyed in the June 20 attack and restart some of the computer systems — including military communications networks — taken offline, the officials said. Senior officials discussed the results of the strike in part to quell doubts within the Trump administration about whether the benefits of the operation outweighed the cost — lost intelligence and lost access to a critical network used by the Islamic Revolutionary Guards Corps, Iran’s paramilitary forces. The United States and Iran have long been involved in an undeclared cyberconflict, one carefully calibrated to remain in the gray zone between war and peace. The June 20 strike was a critical attack in that ongoing battle, officials said, and it went forward even after President Trump called off a retaliatory airstrike that day after Iran shot down an American drone. Iran has not escalated its attacks in response, continuing its cyberoperations against the United States government and American corporations at a steady rate, according to American government officials. The strike on the Revolutionary Guards’ intelligence group diminished Iran’s ability to conduct covert attacks, said a senior official.

A secret cyberattack against Iran in June wiped out a critical database used by Iran’s paramilitary arm to plot attacks against oil tankers and degraded Tehran’s ability to covertly target shipping traffic in the Persian Gulf, at least temporarily, according to senior American officials. Iran is still trying to recover information destroyed in the June 20 attack and restart some of the computer systems — including military communications networks — taken offline, the officials said. Senior officials discussed the results of the strike in part to quell doubts within the Trump administration about whether the benefits of the operation outweighed the cost — lost intelligence and lost access to a critical network used by the Islamic Revolutionary Guards Corps, Iran’s paramilitary forces. The United States and Iran have long been involved in an undeclared cyberconflict, one carefully calibrated to remain in the gray zone between war and peace. The June 20 strike was a critical attack in that ongoing battle, officials said, and it went forward even after President Trump called off a retaliatory airstrike that day after Iran shot down an American drone. Iran has not escalated its attacks in response, continuing its cyberoperations against the United States government and American corporations at a steady rate, according to American government officials. The strike on the Revolutionary Guards’ intelligence group diminished Iran’s ability to conduct covert attacks, said a senior official.

Less

Tailgate Detection Where You Need It

Tailgate Detection Where You Need It

Less

Detex puts dependable in restricted secure areas - at gym and dorm entrances, offices, and any other area where unauthorized entry must be controlled, and authorized entry must be easy, quick and reliable. You may also need to protect departments within your facility. The Restricted Access System is easy to retrofit, compatible with most access control technologies, and can be customized for your needs. Visit Detex at GSX booth 714. 

Detex puts dependable in restricted secure areas - at gym and dorm entrances, offices, and any other area where unauthorized entry must be controlled, and authorized entry must be easy, quick and reliable. You may also need to protect departments within your facility. The Restricted Access System is easy to retrofit, compatible with most access control technologies, and can be customized for your needs. Visit Detex at GSX booth 714. 

Less

ASIS News Less

ASIS News 

Members are the heart and soul of ASIS International. Their stories are not only as diverse as our population, but thoughtful and compelling. When they face challenges or need help in their jobs, they can turn to their community of 34,000+ strong global security professionals.

Members are the heart and soul of ASIS International. Their stories are not only as diverse as our population, but thoughtful and compelling. When they face challenges or need help in their jobs, they can turn to their community of 34,000+ strong global security professionals.

Less

See what’s posted to date and keep your eyes out on social to see who is featured next! 

See what’s posted to date and keep your eyes out on social to see who is featured next! 

Less

Rotated China Troops 'Will Defend Hong Kong Prosperity'Less

Rotated China Troops 'Will Defend Hong Kong Prosperity'

From "Rotated China Troops 'Will Defend Hong Kong Prosperity'"

Reuters (08/29/19)

From "Rotated China Troops 'Will Defend Hong Kong Prosperity'"

Reuters (08/29/19)

Less

China rotated troops in its People’s Liberation Army (PLA) garrison in Hong Kong on Thursday, days before protesters planned to hold a march calling for full democracy for the Chinese-ruled city after three months of sometimes violent demonstrations. Chinese state media described the troop movement as routine and Asian and Western diplomats watching PLA movements in the China rotated troops in its People’s Liberation Army (PLA) garrison in Hong Kong on Thursday, days before protesters planned to hold a march calling for full democracy for the Chinese-ruled city after three months of sometimes violent demonstrations. Chinese state media described the troop movement as routine and Asian and Western diplomats watching PLA movements in the former British colony had been expecting it. Observers estimate the Hong Kong garrison numbers between 8,000 and 10,000 troops split between bases in southern China and a network of former British army barracks in Hong Kong. Trucks full of white-gloved PLA soldiers rolled into Hong Kong within hours of the 1997 handover, raising questions about their role. They stage frequent drills but have seldom since been seen outside their bases. Witnesses on Thursday saw significantly more activity in and around the PLA’s Shek Kong military base in the rural New Territories than has been apparent in recent months. China has denounced the protests and accused the United States and Britain of interfering in its affairs in Hong Kong. It has sent clear warnings that forceful intervention is possible. Chinese defense ministry spokesman Ren Guoqiang told a regular monthly news briefing that the garrison troops would fulfil their obligation of defending Hong Kong according to the law and would follow the orders of the Communist Party. Beijing is eager to quell the unrest before the 70th anniversary of the founding of the People’s Republic of China on Oct. 1.

China rotated troops in its People’s Liberation Army (PLA) garrison in Hong Kong on Thursday, days before protesters planned to hold a march calling for full democracy for the Chinese-ruled city after three months of sometimes violent demonstrations. Chinese state media described the troop movement as routine and Asian and Western diplomats watching PLA movements in the China rotated troops in its People’s Liberation Army (PLA) garrison in Hong Kong on Thursday, days before protesters planned to hold a march calling for full democracy for the Chinese-ruled city after three months of sometimes violent demonstrations. Chinese state media described the troop movement as routine and Asian and Western diplomats watching PLA movements in the former British colony had been expecting it. Observers estimate the Hong Kong garrison numbers between 8,000 and 10,000 troops split between bases in southern China and a network of former British army barracks in Hong Kong. Trucks full of white-gloved PLA soldiers rolled into Hong Kong within hours of the 1997 handover, raising questions about their role. They stage frequent drills but have seldom since been seen outside their bases. Witnesses on Thursday saw significantly more activity in and around the PLA’s Shek Kong military base in the rural New Territories than has been apparent in recent months. China has denounced the protests and accused the United States and Britain of interfering in its affairs in Hong Kong. It has sent clear warnings that forceful intervention is possible. Chinese defense ministry spokesman Ren Guoqiang told a regular monthly news briefing that the garrison troops would fulfil their obligation of defending Hong Kong according to the law and would follow the orders of the Communist Party. Beijing is eager to quell the unrest before the 70th anniversary of the founding of the People’s Republic of China on Oct. 1.

Less

Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. Eliminate paper logbooks and create an audit trail to properly manage visitors. The Symmetry GUEST Kiosks come in three main designs (Countertop, Slim Wall Mount and Freestanding) and two colors (white or black) with custom branding options to best meet visitor check-in requirements and lobby décor. Kiosk setup is fast and easy as the software and hardware come pre-installed. 

Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. Eliminate paper logbooks and create an audit trail to properly manage visitors. The Symmetry GUEST Kiosks come in three main designs (Countertop, Slim Wall Mount and Freestanding) and two colors (white or black) with custom branding options to best meet visitor check-in requirements and lobby décor. Kiosk setup is fast and easy as the software and hardware come pre-installed. 

Less

For ISIS Children, Returning Home to Europe Meets ResistanceLess

For ISIS Children, Returning Home to Europe Meets Resistance

From "For ISIS Children, Returning Home to Europe Meets Resistance"

New York Times (08/16/19) Annamaneni, Keerthana

From "For ISIS Children, Returning Home to Europe Meets Resistance"

New York Times (08/16/19) Annamaneni, Keerthana

Less

France and Belgium recently welcomed 18 children of ISIS fighters, reigniting a debate over the best way to handle the stranded children of European nationals who left their countries to fight in Syria and Iraq. Some European governments have been cautiously open to the idea of repatriation, but still require months of lengthy negotiations and vetting. As a result, at least 1,300 children of European-born ISIS fighters remain in refugee camps in Syria and Iraq that are known to feature violence, resource scarcity, and disease. The French and Belgian repatriations in June followed a typical trend in Europe—accepting children, but not adults who left European nations to become jihadis. Meanwhile, the Kurdish authorities running refugee camps have mostly refused to separate families, Accordingly, any child with a living parent is unlikely to be brought back to Europe. The hesitation stems from the sense that anyone associated with ISIS, even a child, is a threat to security and safety in Europe. In the camps, thousands of women and children are crammed together, all with varying degrees of loyalty remaining to the Islamic State, and it can be difficult to determine who is still a faithful ISIS supporter and who has renounced the terror group. European nations are taking various approaches to the repatriation question. The United Kingdom has stripped adults of their British citizenship, while Belgium promised to repatriate children under 10 and make case-by-case decisions on children over 10. A February poll revealed that two-thirds of the French people oppose the repatriation of children.

France and Belgium recently welcomed 18 children of ISIS fighters, reigniting a debate over the best way to handle the stranded children of European nationals who left their countries to fight in Syria and Iraq. Some European governments have been cautiously open to the idea of repatriation, but still require months of lengthy negotiations and vetting. As a result, at least 1,300 children of European-born ISIS fighters remain in refugee camps in Syria and Iraq that are known to feature violence, resource scarcity, and disease. The French and Belgian repatriations in June followed a typical trend in Europe—accepting children, but not adults who left European nations to become jihadis. Meanwhile, the Kurdish authorities running refugee camps have mostly refused to separate families, Accordingly, any child with a living parent is unlikely to be brought back to Europe. The hesitation stems from the sense that anyone associated with ISIS, even a child, is a threat to security and safety in Europe. In the camps, thousands of women and children are crammed together, all with varying degrees of loyalty remaining to the Islamic State, and it can be difficult to determine who is still a faithful ISIS supporter and who has renounced the terror group. European nations are taking various approaches to the repatriation question. The United Kingdom has stripped adults of their British citizenship, while Belgium promised to repatriate children under 10 and make case-by-case decisions on children over 10. A February poll revealed that two-thirds of the French people oppose the repatriation of children.

Less

Feds Seek Death Penalty in Pittsburgh Synagogue MassacreLess

Feds Seek Death Penalty in Pittsburgh Synagogue Massacre

From "Feds Seek Death Penalty in Pittsburgh Synagogue Massacre"

Associated Press (08/26/19) Scolforo, Mark

From "Feds Seek Death Penalty in Pittsburgh Synagogue Massacre"

Associated Press (08/26/19) Scolforo, Mark

Less

Robert Bowers, the man charged with killing 11 people in Pittsburgh's Tree of Life synagogue last year, should face the death penalty if convicted, federal prosecutors said in a court filing Monday. The government filing said justification for a death sentence included allegations of substantial planning and premeditation, the vulnerability of the victims, and a motivation of religious hostility. Bowers is accused of using an AR-15 rifle and other weapons to target worshippers in the Tree of Life synagogue during Saturday morning services. Bowers has pleaded not guilty and awaits trial; his lawyers did not return messages seeking comment. Law enforcement authorities said he expressed hatred of Jews during and after the attack.

Robert Bowers, the man charged with killing 11 people in Pittsburgh's Tree of Life synagogue last year, should face the death penalty if convicted, federal prosecutors said in a court filing Monday. The government filing said justification for a death sentence included allegations of substantial planning and premeditation, the vulnerability of the victims, and a motivation of religious hostility. Bowers is accused of using an AR-15 rifle and other weapons to target worshippers in the Tree of Life synagogue during Saturday morning services. Bowers has pleaded not guilty and awaits trial; his lawyers did not return messages seeking comment. Law enforcement authorities said he expressed hatred of Jews during and after the attack.

Less

Keep Your People and Places Safe With CAP Index CRIMECAST® Data

Keep Your People and Places Safe With CAP Index CRIMECAST® Data

Less

80% of the Fortune 100 use CAP Index CRIMECAST Reports to develop their security assessments and justify their security management expenditures across their entire organization.

80% of the Fortune 100 use CAP Index CRIMECAST Reports to develop their security assessments and justify their security management expenditures across their entire organization.

Less

CLICK HERE to get a FREE analysis of the risk at one of your locations and learn how CAP Index can help you Assess Risk and Outsmart Crime. 

CLICK HERE to get a FREE analysis of the risk at one of your locations and learn how CAP Index can help you Assess Risk and Outsmart Crime. 

Less

Tesla Faces Another Security Issue After Researchers Hack Its Key Fobs AgainLess

Tesla Faces Another Security Issue After Researchers Hack Its Key Fobs Again

From "Tesla Faces Another Security Issue After Researchers Hack Its Key Fobs Again"

Fast Company (08/27/19) Weber, Harrison

From "Tesla Faces Another Security Issue After Researchers Hack Its Key Fobs Again"

Fast Company (08/27/19) Weber, Harrison

Less

Researchers at KU Leuven, a Belgian university, have announced that for the second time this year, they successfully hacked into Tesla's keyless entry system. When the researchers first exposed a Tesla vulnerability earlier this year, Tesla responded by upgrading its fob encryption from 40-bit to 80-bit. In theory, the added protection would make the fob system significantly more secure. But the researchers were able to find a new bug in the system regardless. The Belgian team said that it was twice as hard to hack the Tesla fob after the security upgrades—a good start, but not even close to how secure the system was supposed to be after the upgrade. In the wake of the most recent vulnerability revelation, Tesla announced that its customers would be able to update their key fobs with an "over-the-air software update" that takes two minutes or less to complete. Tesla owners looking for additional security can use the company's PIN-to-Drive feature, which requires any driver to input a PIN as well as have the key fob before he or she can drive the car.

Researchers at KU Leuven, a Belgian university, have announced that for the second time this year, they successfully hacked into Tesla's keyless entry system. When the researchers first exposed a Tesla vulnerability earlier this year, Tesla responded by upgrading its fob encryption from 40-bit to 80-bit. In theory, the added protection would make the fob system significantly more secure. But the researchers were able to find a new bug in the system regardless. The Belgian team said that it was twice as hard to hack the Tesla fob after the security upgrades—a good start, but not even close to how secure the system was supposed to be after the upgrade. In the wake of the most recent vulnerability revelation, Tesla announced that its customers would be able to update their key fobs with an "over-the-air software update" that takes two minutes or less to complete. Tesla owners looking for additional security can use the company's PIN-to-Drive feature, which requires any driver to input a PIN as well as have the key fob before he or she can drive the car.

Less

NIST Wants Insight on Combatting Telehealth Cybersecurity Risks

NIST Wants Insight on Combatting Telehealth Cybersecurity Risks

Less

From "NIST Wants Insight on Combatting Telehealth Cybersecurity Risks"

NextGov.com (08/28/19) Vincent, Brandi

From "NIST Wants Insight on Combatting Telehealth Cybersecurity Risks"

NextGov.com (08/28/19) Vincent, Brandi

Less

The National Institute of Standards and Technology is looking for input from vendors who can deliver technical expertise and products that can help secure health organizations' telehealth capabilities. The agency wants vendors to provide insight and demonstrations to support the National Cybersecurity Center of Excellence's (NCCoE) health care sector-specific use case, "Securing Telehealth Remote Patient Monitoring Ecosystem." NIST officials state that "this project will result in a publicly available [NIST] Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement a cybersecurity reference design that addresses this challenge." Following submissions, the agency will select participants with which it will enter a consortium research and development agreement. "The expected outcome of the demonstration is to improve telehealth RPM cybersecurity across an entire health care sector enterprise,” officials wrote.

The National Institute of Standards and Technology is looking for input from vendors who can deliver technical expertise and products that can help secure health organizations' telehealth capabilities. The agency wants vendors to provide insight and demonstrations to support the National Cybersecurity Center of Excellence's (NCCoE) health care sector-specific use case, "Securing Telehealth Remote Patient Monitoring Ecosystem." NIST officials state that "this project will result in a publicly available [NIST] Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement a cybersecurity reference design that addresses this challenge." Following submissions, the agency will select participants with which it will enter a consortium research and development agreement. "The expected outcome of the demonstration is to improve telehealth RPM cybersecurity across an entire health care sector enterprise,” officials wrote.

Less

Hostinger Security Breach Impacts 14M CustomersLess

Hostinger Security Breach Impacts 14M Customers

From "Hostinger Security Breach Impacts 14M Customers"

PC Magazine (08/26/19) Humphries, Matthew

From "Hostinger Security Breach Impacts 14M Customers"

PC Magazine (08/26/19) Humphries, Matthew

Less

On August 23, web hosting company Hostinger suffered a security breach that allowed an unauthorized third party to access its internal systems. The server contained the company's internal system API and associated database that held customer information, including hashed passwords, which were protected with the vulnerable SHA-1 algorithm. About 14 million Hostinger customers had information stored in the database. Hostinger responded to the breach by resetting all client passwords and notifying customers that they need to select a new password. No payment details were compromised in the breach. Hostinger is currently investigating the source of the breach, which was made possible due to an authorization token being present on the server allowing for access without need of a username or password.

On August 23, web hosting company Hostinger suffered a security breach that allowed an unauthorized third party to access its internal systems. The server contained the company's internal system API and associated database that held customer information, including hashed passwords, which were protected with the vulnerable SHA-1 algorithm. About 14 million Hostinger customers had information stored in the database. Hostinger responded to the breach by resetting all client passwords and notifying customers that they need to select a new password. No payment details were compromised in the breach. Hostinger is currently investigating the source of the breach, which was made possible due to an authorization token being present on the server allowing for access without need of a username or password.

Less

More than 130 U.S. Companies Have Reportedly Applied to Sell to Huawei, But the Commerce Department Has Approved None of ThemLess

More than 130 U.S. Companies Have Reportedly Applied to Sell to Huawei, But the Commerce Department Has Approved None of Them

From "More than 130 U.S. Companies Have Reportedly Applied to Sell to Huawei, But the Commerce Department Has Approved None of Them"

TechCrunch (08/28/19) Shu, Catherine

From "More than 130 U.S. Companies Have Reportedly Applied to Sell to Huawei, But the Commerce Department Has Approved None of Them"

TechCrunch (08/28/19) Shu, Catherine

Less

More than 130 U.S. suppliers have applied to sell Huawei while it remains blacklisted, but the U.S. Commerce Department has not approved any of those pending applications. Huawei has served as a bargaining chip in the U.S.-China trade war, which escalated again last week with more tariff and duty increases on both sides. In June, Trump told Chinese leader Xi Jinping that he would allow some American companies to sell Huawei. A former Commerce department official told Reuters that no licenses have been granted yet because “nobody in the executive branch knows what [Trump] wants and they’re all afraid to make a decision without knowing that.” Huawei is an important customer for many U.S. tech firms, including Qualcomm, Intel and Micron, and $11 billion of the $70 billion in parts it bought last year went to U.S. suppliers. The U.S. claims Huawei is a national security risk, which the company denies.

More than 130 U.S. suppliers have applied to sell Huawei while it remains blacklisted, but the U.S. Commerce Department has not approved any of those pending applications. Huawei has served as a bargaining chip in the U.S.-China trade war, which escalated again last week with more tariff and duty increases on both sides. In June, Trump told Chinese leader Xi Jinping that he would allow some American companies to sell Huawei. A former Commerce department official told Reuters that no licenses have been granted yet because “nobody in the executive branch knows what [Trump] wants and they’re all afraid to make a decision without knowing that.” Huawei is an important customer for many U.S. tech firms, including Qualcomm, Intel and Micron, and $11 billion of the $70 billion in parts it bought last year went to U.S. suppliers. The U.S. claims Huawei is a national security risk, which the company denies.

Less

SMBs Continue to "Struggle" with IT Security Due to Budget, Workplace LimitationsLess

SMBs Continue to "Struggle" with IT Security Due to Budget, Workplace Limitations

From "SMBs Continue to "Struggle" with IT Security Due to Budget, Workplace Limitations"

iTWire (08/28/19) Dinham, Peter

From "SMBs Continue to "Struggle" with IT Security Due to Budget, Workplace Limitations"

iTWire (08/28/19) Dinham, Peter

Less

According to a recent survey by network security firm Untangle, 80 percent of small and medium-sized businesses (SMBs) rank IT security as a top business priority, while 29 percent spend less than $1,000 on IT security annually. Fifty-two percent of the SMBs surveyed said they do not have an in-house IT security professional on staff and therefore distribute the responsibility across other roles. Sixty-one percent of SMBs say that branch office management and network security are their biggest incentives to deploy software-defined wide-area networking (SD-WAN) solutions. Fifty-six percent of SMBs admit that recent security breaches affect their security roadmap, and 40 percent operate in at least five physical locations, including remote-access workers. Forty-eight percent of SMBs list budget constraints as the main barrier faced when it comes to IT security, followed by limited time to research new threats (36 percent) and employees who do not follow IT security guidelines (32 percent). Seventy-four percent of SMBs have at least part of their IT infrastructure deployed in the cloud. SMBs ranked network security, antivirus/anti-malware, and identity access management as the most important features to their organization when purchasing IT security solutions.

According to a recent survey by network security firm Untangle, 80 percent of small and medium-sized businesses (SMBs) rank IT security as a top business priority, while 29 percent spend less than $1,000 on IT security annually. Fifty-two percent of the SMBs surveyed said they do not have an in-house IT security professional on staff and therefore distribute the responsibility across other roles. Sixty-one percent of SMBs say that branch office management and network security are their biggest incentives to deploy software-defined wide-area networking (SD-WAN) solutions. Fifty-six percent of SMBs admit that recent security breaches affect their security roadmap, and 40 percent operate in at least five physical locations, including remote-access workers. Forty-eight percent of SMBs list budget constraints as the main barrier faced when it comes to IT security, followed by limited time to research new threats (36 percent) and employees who do not follow IT security guidelines (32 percent). Seventy-four percent of SMBs have at least part of their IT infrastructure deployed in the cloud. SMBs ranked network security, antivirus/anti-malware, and identity access management as the most important features to their organization when purchasing IT security solutions.

Less

Barclay's Tops List of Banks With Most IT ShutdownsLess

Barclay's Tops List of Banks With Most IT Shutdowns

From "Barclay's Tops List of Banks With Most IT Shutdowns"

BBC (08/21/19) Read, Simon

From "Barclay's Tops List of Banks With Most IT Shutdowns"

BBC (08/21/19) Read, Simon

Less

Last year, banks in the United Kingdom started publishing information on the number of operational and security incidents affecting their services. Barclay's has earned the dubious distinction of having the most shutdowns prompted by IT concerns. Data trends suggest that major banks collectively suffer more than 10 outages per month. Over the past 12 months, Barclay's reported 33 incidents, outranking both NatWest at 25 and Lloyds Bank at 23. A Barclay's spokesperson said that the bank's systems have been designed so as to provide full service to customers even in the event of a shutdown, and further pointed out that it has seen a "consistent reduction" in the number of shutdowns over the previous year. Meanwhile, RBS customers faced a stressful situation Tuesday as an IT problem that the bank blamed on a third party service provider temporarily prevented them from viewing their credit card information online or on their phones. And Barclay's has also just warned its customers that its online and telephone services will be briefly down later this week as its systems update themselves.

Last year, banks in the United Kingdom started publishing information on the number of operational and security incidents affecting their services. Barclay's has earned the dubious distinction of having the most shutdowns prompted by IT concerns. Data trends suggest that major banks collectively suffer more than 10 outages per month. Over the past 12 months, Barclay's reported 33 incidents, outranking both NatWest at 25 and Lloyds Bank at 23. A Barclay's spokesperson said that the bank's systems have been designed so as to provide full service to customers even in the event of a shutdown, and further pointed out that it has seen a "consistent reduction" in the number of shutdowns over the previous year. Meanwhile, RBS customers faced a stressful situation Tuesday as an IT problem that the bank blamed on a third party service provider temporarily prevented them from viewing their credit card information online or on their phones. And Barclay's has also just warned its customers that its online and telephone services will be briefly down later this week as its systems update themselves.

Less

News summaries © copyright 2019 SmithBucklin 

News summaries © copyright 2019 SmithBucklin 

Less

August 29, 2019Less

August 29, 2019

Calendar of Events Less

Calendar of Events 

UPCOMING EVENTS:Less
UPCOMING EVENTS:

Webinars 

Webinars 

Less
Less
ASIS INTERNATIONALLess
ASIS INTERNATIONAL

If you have questions, please contact Member Services at asis@asisonline.org  or +1.703.519.6200, or via 1625 Prince Street, Alexandria, VA 22314 USA.

If you have questions, please contact Member Services at asis@asisonline.org  or +1.703.519.6200, or via 1625 Prince Street, Alexandria, VA 22314 USA.

Less

ASIS International values the privacy and integrity of our members, partners, attendees, exhibitors, and sponsors, and we do not sell your contact information, nor do we provide it to third-party vendors for distribution. View privacy policy http://listservm.infoinc.com/trk/click?ref=zwf21n1o2_2-528ex3580cbx0785826&

ASIS International values the privacy and integrity of our members, partners, attendees, exhibitors, and sponsors, and we do not sell your contact information, nor do we provide it to third-party vendors for distribution. View privacy policy http://listservm.infoinc.com/trk/click?ref=zwf21n1o2_2-528ex3580cbx0785826&

Less

"Maritime Defense Strategy, LLC provides excellent work and are very knowledgeable. Their compliance audits are very extensive and help ensure the client understands not only what is required but why and what you can do to meet the requirements. Great company and good people to work with."

Rob Carney- Ergon Refining- Vicksburg, MS