Log in


<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 
  • February 13, 2019 1:08 PM | Office IFCPP (Administrator)

    Reposted from The Voice

    Violence in the workplace, unfortunately, is an issue that is not going away, with reports of incidents at businesses and even schools around the country continuing to lead to tragic results.

    While the causes of these incidents may vary, one thing is consistent: A business can take the proper steps to secure the workplace to ensure such incidents are less likely to happen and to minimize damage. One key step on the path toward maximum employee safety is the continued emergence of new technology to improve security.

    High-tech surveillance

    Long gone are the days when businesses had to review grainy video on a VHS tape to see what was happening at their workplace. It’s all digital now, and video feeds can be monitored and stored online, at all times.

    Another innovative move is the trend toward pairing entry badges with the camera system, so you can see exactly who is coming and going at all times. If an employee badge is swiped, you’ll be able to see if a different person is using the badge just by monitoring your video. Alerts can also be set up to warn you of possible situations relating to building access.

    These types of advances in technology eliminate some of the loopholes criminals may have been able to exploit in the past.

    Protect internally

    A stranger or disgruntled customer is not always the person who turns violent. While that may happen on occasion, the reality is that often the threat comes from someone you know and trust.

    It could be a family member unhappy about a domestic situation, or an angry co-worker taking out their frustrations. These people would already have access to the building, so what can be done in that scenario to keep things as safe as possible?

    The solution is to create safe zones internally. Remotely controlled systems can be set up to close and lock office doors, or remotely close off parts of an office building.

    While you never want to have to use them, these internal safe zones can potentially save lives in the most serious circumstances, and should be considered by businesses committed to employee safety.

    Physical security is key

    Managed service providers like NTM offer multiple package options for access control and video surveillance to fit various-sized businesses, so keeping your employees adequately safe doesn’t need to be cost-prohibitive. In the end, whatever business you are in, nothing matters more than the safety of your employees. Having a strong, high-tech surveillance system is a critical part of an IT plan, and can keep you prepared for even a worst-case scenario in the workplace, especially with the advances in today’s technology.

    See Original Post

  • February 13, 2019 12:59 PM | Office IFCPP (Administrator)

    Reposted from El Pais

    Last August, two visitors accidentally damaged sculptures by Iranian artist Nairy Baghramian at her exhibition at the Palacio de Cristal in Madrid’s central El Retiro park. The first accident happened just two days after the exhibition opened, when a tourist tripped over one of the sculptures as she was taking a photo.

    “The guard saw it happening and ran to stop her from falling on the work but did not get there in time,” explains Jorge García Gómez-Tejedor, head of art restoration at the Reina Sofía museum, the modern art gallery that organized the exhibition. A day later a report by the museum confirmed that the work had been damaged.

    “The artist asked us to urgently fix it. She didn’t want the broken glass to be seen,” explains Gómez-Tejedor. “The works are made from very delicate material. We had to handle them with extreme care. I would not be surprised if this had happened to her before.”

    Ten days later another glass sculpture, made of four parts and fixed to the floor to the left of the entrance, was damaged in another accident. “While the guard was talking to the head of security about a separate incident, a girl sat down on the piece, causing it to break and for pieces of it to shatter,” explains the second accident report, which has been seen by EL PAÍS. The child was not injured in the accident.

    No insurance

    “It’s glass mesh and an aluminum structure. Everything is very delicate. We told [Baghramian] that this could happen. They are very delicate works and the artist played at blending [the works] with the space and camouflaging them within the space. This also didn’t help,” says Gómez-Tejedor. “I don’t like accidents happening like this – they’re serious, not just an anecdote. But an accident can always happen, no matter how much foresight we have,” he adds.

    The damage to the works will cost the state coffers €13,700 because they weren’t insured. The artist’s workshop assistant will be responsible for reproducing them. The Reina Sofía Museum says that it signed a contract that covered the cost of producing the specific project for the space, but not for insuring the particulars of the exhibition space. All artworks featured in the other Reina Sofía Museum venues are insured – all except for pieces that appear in the Palacio de Cristal.

    The Baghramian exhibition cost  €94,000, including the almost €14,000 for the repairs

    Given that the space is located in a park, with openings where birds can fly through and potentially stain the works, the insurance budget would be “extremely high.” “They would also impose a series of conditions on us (such as barriers, paths, etc.), which most artists and curators would not agree to. We make a contract with the artists that states that, if there is any damage, as in this case, the museum will be responsible, assuming a much lower cost,” the museum explains. In the case of the Baghramian exhibition, the project cost €94,000 in total, including the almost €14,000 for the repairs.

    “Invisible” artworks

    Baghramian’s sculptures play with the glass and metal materials of the Palacio de Cristal. The idea behind the camouflage is to open a debate on privacy and exhibition, the interior and the exterior. During her visit to Madrid, the Iranian artist said that the color of the works, which were inspired by the space, made them “invisible.” According to the Reina Sofía, “her sculptures create organic forms with bulges and cavities.”

    The pieces are also fragile and poetic, like the Palacio de Cristal itself, which was built at the end of the 19th century as a greenhouse to display exotic species from the Philippines. Last year, more than 1.6 million people visited the space, which has no entry charge. The central site of the Reina Sofía Museum, the Sabatini Building near Atocha train station, received just 50,000 more visitors.

    According to Gómez-Tejedor, days before the exhibition opened the site was reviewed by security to decide how many guards would be needed to handle the visitors. “As a minimum there are two guards and another two people in charge of providing information. But everything depends on the piece.”

    The Palacio de Cristal has hosted other exhibitions that involved less risk, such as the piece by Danh Vo that was hung from the roof in 2016, a two-hour audio recording of the Hudson River by German sound artist Lothar Baumgarten, and more recently, an installation by Colombian artist Doris Salcedo, where the names of migrants who had died at sea disappeared and reappeared under water.

    See Original Post

  • February 13, 2019 12:46 PM | Office IFCPP (Administrator)

    Reposted from Allied Universal

    Many people who wouldn’t dream of leaving their computer or phone sitting in their unlocked car think nothing of leaving those items in an unattended cubicle at work. If you think your belongings are safe in your office, think again…technological advances have bred a whole new generation of criminals called “office creepers.”

    These individuals are dressed like your coworkers or building service personnel and rely on the anonymity of busy office buildings to cover them during their crime. However, you CAN prevent an “office creeper” from becoming successful if you use the following tips as a guide:

    Recognizing an Office Creeper

    • Try to become familiar with most of the coworkers in your immediate area. That way, you can easily identify an individual who may be out of place.

    • If you see someone wandering the halls or casually roaming about, ask if you can help her/him. Ask questions like, “May I help you find someone?”

    • If your building has an access control policy where visitors must wear a badge, you should notify security immediately if someone is walking around without proper identification.

    • If you believe an individual seems suspicious, notify security. Be sure to note details about the person’s appearance so that you can thoroughly describe her/him.

    Tips To Protect Your Office

    • Never share keys or access codes with ANYONE.

    • Likewise, don’t leave your office keys unattended.

    • Keep personal keys and office keys on separate rings.

    • Don’t “hide” your wallets or purses in unlocked cabinet drawers or under your desk. This is the first place an “office creeper” may look!

    • Position coat racks and hangers away from doorways so that a thief can’t easily snatch items from the outside.

    • When leaving your office, make sure to lock the door and mute the telephone ringer. An unanswered phone is a clue to a thief that your office is empty.

    • Talk to management about purchasing a security cable for your laptop. This is an inexpensive locking device that secures your computer to the desk so it can’t be removed.

    • Keep an accurate inventory of all office equipment, furniture and devices in a locked, fireproof cabinet or in another location completely (like home).

    • Clearly mark all of your personal electronics, like PDAs and cell phones with identification. You can use non-removable tags or an inexpensive engraving pen.

    See Original Post

  • February 13, 2019 12:40 PM | Office IFCPP (Administrator)

    Shared by IFCPP Member Allen Bohnert, CIPM

    The Center for Collections Care at Beloit College (C3) provides one-of-a-kind opportunities for hands-on learning and practice for museum, library, archive, and conservation professionals and emerging professionals. Our distinctive resources—two campus museums (Logan Museum of Anthropology and Wright Museum of Art), a vibrant archive, historic costume and natural history collections—situated on the residential campus of a small, liberal arts college, provide unparalleled opportunities to gain new skills, network with other professionals, and better prepare for advancement. 

    The Center’s courses are taught by accomplished professionals who are committed to sharing their knowledge and expertise. The Center’s residential learning community of practice offers participants the opportunity to connect with and learn from one another. The real impact of Center for Collections Care at Beloit College training is realized when participants return to their home institutions equipped with the knowledge, skills, and confidence to effect positive change.

    Learn More

  • February 13, 2019 12:31 PM | Office IFCPP (Administrator)

    Reposted from the Huffington Post

    Protests erupted inside New York’s Solomon R. Guggenheim Museum Saturday night as demonstrators demanded the museum ditch its ties with the Sackler family ― the owners of Purdue Pharma, manufacturer and marketer of prescription painkiller OxyContin.

    The museum’s Sackler Center for Arts Education, which includes multimedia labs and lecture theatres sprawled out over 8,200-square feet, was a gift from the family and opened to the public in 2001.

    Footage of the incident uploaded to Twitter show leaflets being thrown from one of the museum’s upper walkways as some protesters staged a die-in.

    Designed to look like prescription slips, the leaflets were a response to allegations made in a court filing that a member of the Sackler family had predicted the launch of the opioid painkiller would be “followed by a blizzard of prescriptions that will bury the competition.”

    Oxycodone, the drug’s active ingredient, is among the most common painkillers in prescription opioid deaths. Per the Associated Press, Purdue Pharma, its executives and members of the Sackler family were recently accused of deceiving patients and doctors about the risk of opioids and allegedly pushed prescribers of the drug to keep patients on it for longer.

    The museum did not immediately respond to HuffPost’s request for comment on the protests.

    The latest demonstration comes after protesters targeted the Metropolitan Museum of Art last year for its ties to the family, tossing mock pill bottles into the moat at the Temple of Dendur ― housed in the museum’s Sackler wing ― which were labeled: “Prescribed to you by the Sackler Family.”

    The New York Times reports that after leaving the Guggenheim, several of the protesters marched down Fifth Avenue with a barrier that read “Shame on Sackler.”

    See Original Post

  • February 13, 2019 12:12 PM | Office IFCPP (Administrator)

    Reposted from Allied Universal

    Whether regional or national, business leaders face the impact of globalization. In today’s world, it is not a question of if a crisis will affect an enterprise, but when. Events, such as a terror attack, data breach, pandemic or travel ban, that happen on the other side of the world can affect business resilience and valuation just as much as those down the street or on premise. 

    Threat Intelligence—delivered to key decision makers in a timely manner—is crucial for the safety of everyone. And businesses want the ability to garner relevant threat intelligence from cyber chatter most critical to the organization and report it to internal stakeholders, who can quickly act upon it. A variety of sophisticated technology tools are gaining popularity for their ability to easily integrate with security programs. Such tools aggregate, analyze and report threat intelligence in real time—for proactive security response. 

    Via open source data channels, social media, the dark web and other publishing platforms, customers use these types of technologies to form common operating pictures to: 

    • Act on real-time alerts of threats such as protest activity, suspicious package, or impending disaster within a radius of interest to facilities or assets.

    • Monitor personalized keywords or locations across multiple social media platforms.

    • Share a common operating picture dashboard of an incident across their organization for collaboration and response as was the case during Hurricane Harvey.

    For example, during the 2018 Winter Olympics in South Korea, TX360, a situational awareness and threat intelligence platform, helped customers stay current with relevant information such as:

    • Official alerts and notices of events that could potentially affect transportation

    • Protest and boycott information and social media content

    • Emergency contact and Olympic information for local law enforcement, U.S. Government departments (Embassy, Department of State) and tourism links

    • Mapping of the locations, and photos and videos and games schedules

    In another example of situational awareness, PlanetRisk ramped up its alerting and reporting dashboards during recent bombings in Austin, Texas, to support timely updates to local organizations the company serves. The platform:

    • Provided location accuracy, timeliness, and context to the threats that developed over a three-week period and

    • Consistently delivered incident notifications of each explosion faster than larger news conglomerates.

    Combined with experienced analysts, these types of services provide relevant data required to identify and understand threats to properties and implement core situational awareness programs that reduce risk and improve ROI for any organization.

    By integrating platforms like TX360 and ThreatMinder into their security operation centers, or through Allied Universal’s Global Security Operating Center as a Service (GSOCaaS), customers can leverage threat intelligence in a profound way. 

    See Original Post

  • January 29, 2019 9:10 PM | Office IFCPP (Administrator)

    Reposted from Securitas Security Services, USA, Inc.

    Who Is an Active Shooter?

    According to Department of Homeland Security (DHS) an active shooter uses firearms to kill or

    attempt to kill people in crowded or confined areas. There may or may not be a logical pattern in which an active shooter finds his victim, and the incident evolves very quickly. Such incidents are unpredictable and can happen anywhere, at any time. The triggers for such incidents could be personal anger, ideology, revenge, mental illness or many other reasons.

    Active Shooter: Survival Tips

    It was just another day at the office for Alex. It was noon as he stepped out of a meeting with his manager. It was time for lunch, and he walked towards the cafeteria. Suddenly, he heard a loud sound. Before he could think clearly, he heard two similar sounds followed by painful cries of people whose voices he couldn’t recognize. Then he realized what has happening. He was too shocked to move. Could he be the next target? What should he do now?

    Active shooting has become a common cause of occupational fatalities in recent times, with instances occurring in schools, offices, shopping malls and other public places. It is essential to know how to react when you face such an incident. Being aware of safety strategies can help you not just stay safe, but also help save the lives of many. An untrained person is likely to react with fear, helplessness and panic. A trained person on the other it hand, can make a big difference to himself or herself, to the people around, and to the situation.

    How to Respond to an Active Shooting Incident
    The Department of Homeland Security (DHS) recommends that when an active shooter is nearby, the best course of action would be to RUN, HIDE or FIGHT.

    1. Run

    ·       Be aware of your environment.

    ·       Know the nearest exits and leave the building if possible. Take others along while you exit. If others disagree, evacuate alone and run/walk to a safe location.
    Leave your bag and other belongings behind.

    ·       Prevent people from entering the premise.

    ·       Call 911 as soon as you think is safe.

    2. Hide

    ·       If the shooter is nearby, or if exiting is not an option, hide in a place where you are not visible. If you are in a hallway or lobby, run to a room.

    ·       Secure your hiding place. If you are in a room, lock it from inside, switch off the lights and block the entrance with heavy furniture.

    ·       Be Silent! Put your cell phone on and silent mode immediately. A ring or a vibration will give away your location.

    3. Fight

    ·       This should only be done as the last resort. If running or hiding is not possible or if your life is in imminent danger and you have no other option, you can use physical force to try to take down the shooter.

    ·       Try to incapacitate the active shooter.

    ·       Yell at the attacker and throw things. Use any physical force available/possible to stop the shooter and defend yourself or others.

    What to Say When You Call 911

    Dial 911 as soon as you think it is safe. Remain calm and give the following information:

    ·       Location of the active shooting incident.

    ·       Number of active shooters.

    ·       Shooter’s physical description.

    ·       Type of arms used in the incident.

    ·       Number of victims or potential victims present.

    What to Do When Law Enforcement Arrives

    ·       Stay calm and follow the instructions given.

    ·       Put down items that you are carrying.

    ·       Raise your hands and spread your fingers.

    ·       Keep your hands visible always.

    ·       Do not make any quick movement towards officer for safety or other reasons.

    ·       Do not shout or yell.

    Additional Resources There are a number of e-learning courses available for Securitas USA employees on workplace safety. These courses help employees understand how to detect, deter and report violent people and incidents. Topics include how-tos on recognizing potentially violent individuals and situations; preventing incidents from escalating; and properly responding to and following up on incidents. Real-life scenarios test learners’ ability to spot “red flags” potential triggers. Titles in the LMS include:

    ·       Workplace Violence

    ·       Shots Fired – When Lightning Strikes

    ·       NSI Suspicious Activity Reporting (SAR): Private Sector Security Training

    The SCPD Library offers courses including:

    ·       Workplace Violence: Recognizing the Warning Signs

    ·       Make it Safe: Your Workplace, Your Job

    ·       Shots Fired On Campus – When Lightning Strikes

    ·       RUN. HIDE. FIGHT. Surviving an Active Shooter Event

    For more information on this and other security related topics, visit the Securitas Safety Awareness Knowledge Center at:

  • January 29, 2019 3:25 PM | Office IFCPP (Administrator)

    Reposted from BBC

    The work, which depicted a young female figure with a mournful expression, was cut out and removed from one of the emergency doors at the venue.

    "We are today filled with a deep sense of indignation," the Bataclan tweeted.

    In November 2015, 90 people were killed when armed militants targeted the venue during a rock concert.

    "Banksy's work, a symbol of recollection and belonging to all: locals, Parisians, citizens of the world, has been taken from us," the Bataclan wrote in a statement posted on Twitter.

    The theft, which occurred overnight on Friday, involved "a group of hooded individuals armed with angle grinders", AFP news agency reports, citing a source close to the investigation.

    The suspects then reportedly drove away with the artwork in a truck.

    Banksy's art has become extremely popular and sought-after. A piece of his work which appeared on a garage in the UK was recently sold privately for a "six-figure sum".

    Last October, Banksy made headlines after one of his paintings was sold for more than £1m at auction by Sotheby's in London - and then immediately shredded itself.

    Who is Banksy?

    Banksy is a famous - but anonymous - British graffiti artist. He keeps his identity a secret.

    He produces pieces of work which pop up in public places, such as on the walls of buildings. A lot of his art is done in a particular style which people can easily recognize.

    He began spray-painting trains and walls in his home city of Bristol in the early 1990s. But in the 2000s, he expanded his work beyond Bristol and was soon leaving his artistic mark all over the world.

    Earlier this month, a piece of graffiti discovered at a monorail station in Tokyo, Japan, caused a stir for bearing resemblance to the famous Banksy painting "Umbrella rat". 

    See Original Post

  • January 29, 2019 3:21 PM | Office IFCPP (Administrator)

    Reposted from Artnet News

    The Andrew W. Mellon Foundation has revealed that there’s been an increase in the number of women and people of color in leadership roles at museums, according to the second part of its Art Museum Staff Demographic Survey.

    The percentage of women holding leadership roles—which the survey defines as “all executive positions,” including directors, CEOs, and CFOs—increased from 57 percent to 62 percent between 2015 and 2018. (Directorships, however, remain majority male, as do curatorial roles with management responsibilities.)

    The number of people of color occupying these positions increased only from 11 percent to 12 percent in this same period. One category that saw significant change, however, was the number of African American curators, which doubled from 2015 to 2018.

    The numbers “offer a snapshot of change that is overdue, slow, but also real and welcome,” said Mariët Westermann, executive vice president of the Mellon Foundation, in a statement on the findings.

    The results, gathered last year and released today, are the culmination of a far-reaching survey of data from 332 art museums and more than 30,000 employees. The foundation began the survey in 2014 and published the first round of results in 2015.

    The report, initiated by the Mellon Foundation, the Association of Art Museum Directors, and the American Alliance of Museums, and administered by the research firm Ithaka S+R, shows that progress has been incremental. Women remain the slight majority of total employees at art museums, though that number slips back when it comes to occupying leadership roles; likewise, museums have hired more people of color in recent years, contributing to a more diverse workforce overall, though in small doses.

    Overall, the speed and frequency at which departments are hiring and promoting women and people of color is taking place largely in the curatorial and education departments, which are considerably larger on average. “While trends in recent hiring are encouraging, certain parts of the museum appear not as quick to change, especially the most senior leadership positions,” Westermann said.

    There have been a growing number of initiatives dedicated to addressing the lack of diversity in museums. In July, the American Association of Museum Directors announced a paid internship program for minority college students, while the Andrew W. Mellon Foundation announced a $4 million grant targeting board diversification at museums around the country just a few weeks ago.

    See Original Post

  • January 29, 2019 1:53 PM | Office IFCPP (Administrator)

    Reposted from TechRepublic

    With more than 600 cybersecurity data breaches in 2018 alone, enterprises must be prepared to prevent and mitigate coming attacks, according to Kelvin Coleman, executive director of the National Cyber Security Alliance (NCSA), a nonprofit public-private partnership promoting cybersecurity and privacy education and awareness.

    Coleman, a former cybersecurity director for the US Department of Homeland Security and the White House National Security Council, has spent his career trying to peer around the corner when it comes to technology, he said. He breaks technology down into three parts: Products, processes, and people. 

    While products and processes can always be improved, the people element tends to be more difficult, Coleman said. 

    It's no secret that cybersecurity should be taken seriously, said Daniel Elliott, director of small business programs at NCSA, which means the CISO should have a seat at the table for all business decisions.

    "Part of that equation, in addition to using big data and insights to inform training and awareness, is to elevate the role of the CISO within the enterprise, and include them in the overall leadership of the organization," he added.

    Here are three trends that will impact enterprise cybersecurity in 2019 and beyond, according to Coleman. 

    1. Rise of Gen Z

    As many members of Generation Z enter the workforce, "none of them have ever lived in this world without their smartphone or their computers," Coleman said. "This is going to have a significant impact on the enterprise this year, and how technology is evaluated and deployed within different generations."

    The rise of Gen Z in the workplace will also impact how companies use technology for fortification, defense, training, development, sales, operations, and most other parts of the enterprise, Coleman said.

    The cybersecurity workforce will also slowly begin to skew younger, Coleman predicted, due to the number of open jobs available, and the number of universities beginning to add coursework in this area. "We know it's only going to grow from here," he added. 

    2. Evolving phishing schemes

    Phishing may be an old threat, but it remains one of the most successful means of attack, Coleman said. "With phishing, we know the adversary is going to continue to evolve to use phishing as a way to literally lure people to download the viruses or malware," he added. Fighting phishing means adequately training employees not to click links or download files that look suspicious, Coleman said.

    These attacks are often effective because they rely on human behavior, rather than a vulnerability in a system, Coleman said. 

    3. Increased focus on employee education

    Businesses must increase their focus on providing employee education around cybersecurity—however, there is no one-size-fits-all method, Coleman said.

    "There are a lot of really great, innovative businesses out there using technology to catch the bad behaviors and then deploying either just-in-time education or sending that feedback back to the organization so they can then provide valuable insights back to leadership to design some programs," he added.

    While it's important for CISOs to keep an eye on emerging technologies and threats, hackers will figure out a way to leverage those to meet their own interests, Elliot said. "But when it comes to securing the enterprise, a lot of it also comes down to not getting caught up in the new technologies so much that we forget the basics of cybersecurity—the two-factor authentication and encryption and segmenting networks," he added. "All those things are so important to organizations."  

    See Original Post

<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 




1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection.  All Rights Reserved