|
|
Call for Authors! |
We would like to extend an invitation to all IFPO members to submit articles for inclusion in our quarterly newsletter. Articles contributed by our members will help us to continue putting together a quality and informative newsletter each quarter.
Interested members should submit their articles in a word document and email them as an attachment to Sandi J. Davies at sandiifpo@earthlink.net
|
U.S. Security Associates Officers Prevent Devastating Damages |
ATLANTA, Georgia – September 2014 – Businesses today rely on security officers to protect people and property and to deter many forms of crime. But oftentimes, the risks that are entirely unexpected have the greatest potential to produce catastrophic losses. This proved true recently at the national headquarters of one of America’s oldest veterans assistance and advocacy organizations, where officers from contract security company U.S. Security Associates patrol the premises.
The facility’s executive director extended his thanks to the security officers for “the recent discoveries and prompt reporting of several after-hours maintenance issues.” In a formal letter of appreciation for the officers’ diligence and attention to detail, he states that these issues “could have resulted in substantial property damage if they had gone unnoticed.”
Read the full article
|
The Future of Security Training |
Professional Security Officer Training - Solutions in e-Learning
by By Lonny Wilder Vice President, Public Safety Professional Security Training Network Target Solutions
The private security industry is large, fast-growing, and global. Unfortunately, it is also plagued by high turnover, poor training, and lax oversight - all of which put the public at risk. Adding fuel to the fire is the unprecedented increase in the proliferation of security breaches and the ever widening threat to virtually every sector of public health and infrastructure. Also unprecedented is the meteoric shift in the vast landscape of professional security officer training. It is not only raising the bar for private and public security stakeholders but offers the expanded promise of significantly improving targeted objectives to protect lives and infrastructure.
Private security is one of the fastest growing occupations in the U.S. There are approximately 1.1 million private security officers working in the United States - far outnumbering American police officers. Some 600,000 private security officers are outsourced, working for specialized security companies hired by clients to secure their premises. As a direct result from the prolific growth, the need to provide vetted and viable training has never had a higher calling.
click here to learn more
|
White Paper on the Contract Security Industry |
Our good friend and highly regarded security acquisition expert Robert H. Perryreleased his Sixth Annual White Paper which is a must-read for owners of contract security companies, as well as Private Equity Groups looking to make investments in this sector. This White Paper is a comprehensive report, updated for events through July 31, 2014, that covers topics such as:
- Defining the Market - Services the typical contract security company offers and the plans for expanding the menu. New insights into the matrix of the "Largest Companies" list.
- Recent Important Developments in the Contract Security and Electronics Industries.
- Mergers and Acquisitions - the most active buyers and the multiples they are paying.
- News on happenings around the world affecting the contract security industry.
- Margins - 2013/2014 margin trend for the small, regional and national contract security providers.
- Multiples - Why 2014 and 2015 may be a good time to sell. How "Obamacare" may affect the market for selling companies.
- Outlook - What's making owners think about selling now. What's keeping owners from putting their company up for sale.
Click here to download the White Paper
|
ASD Reports - The Global CyberSecurity Market 2014-2024 |
The Global Cybersecurity Market 2014-2024 report, provides readers with a detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of industry leading companies, and key news.
Key Findings
- The global cybersecurity market is expected to experience a CAGR growth of 4.62% during 2014-2024
- North America, followed by Asia Pacific, are expected to be the largest cybersecurity markets with a cumulative market share of more than 50%
- The network security segment is expected to dominate the cybersecurity market with a share of 35.1%
- Increased dependence on information technology and the dynamic nature of cyber threats anticipated to drive the market over the forecast period
This report analyzes factors that influence demand for cybersecurity activities, key market trends, and challenges faced by industry participants.
Click here to print the order form for The Global Cybersecurity Market 2014-2024 report
|
Home Depot Confirms Payment Systems Breach in U.S., Canada |
September 09, 2014 Written by Marley Jay for the Associated Press
NEW YORK — Shares of home-improvement retailer Home Depot sank before the opening bell Tuesday after confirming that its payment systems had been hacked, potentially exposing millions of shoppers who used credit and debit cards at its more than 2,000 U.S. and Canadian stores.
The breach could turn out to be one of the biggest in history. Home Depot did not say how many cards might be affected, but the largest U.S. home improvement chain did say late Monday that its investigation into the breach goes as far back as April.
The news comes nearly a week after a website that focuses on cybersecurity reported on Tuesday a possible hack of Home Depot's data. The company said later that day that it was investigating the potential breach.
"We apologize for the frustration and anxiety this causes our customers, and I want to thank them for their patience and support as we work through this issue," Chairman and CEO Frank Blake said in a press release.
click here to read or download the full article |
|
|
|