INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from Allied Universal
Many people who wouldn’t dream of leaving their computer or phone sitting in their unlocked car think nothing of leaving those items in an unattended cubicle at work. If you think your belongings are safe in your office, think again…technological advances have bred a whole new generation of criminals called “office creepers.”
These individuals are dressed like your coworkers or building service personnel and rely on the anonymity of busy office buildings to cover them during their crime. However, you CAN prevent an “office creeper” from becoming successful if you use the following tips as a guide: Recognizing an Office Creeper
Try to become familiar with most of the coworkers in your immediate area. That way, you can easily identify an individual who may be out of place.
If you see someone wandering the halls or casually roaming about, ask if you can help her/him. Ask questions like, “May I help you find someone?”
If your building has an access control policy where visitors must wear a badge, you should notify security immediately if someone is walking around without proper identification.
If you believe an individual seems suspicious, notify security. Be sure to note details about the person’s appearance so that you can thoroughly describe her/him.
Never share keys or access codes with ANYONE.
Likewise, don’t leave your office keys unattended.
Keep personal keys and office keys on separate rings.
Don’t “hide” your wallets or purses in unlocked cabinet drawers or under your desk. This is the first place an “office creeper” may look!
Position coat racks and hangers away from doorways so that a thief can’t easily snatch items from the outside.
When leaving your office, make sure to lock the door and mute the telephone ringer. An unanswered phone is a clue to a thief that your office is empty.
Talk to management about purchasing a security cable for your laptop. This is an inexpensive locking device that secures your computer to the desk so it can’t be removed.
Keep an accurate inventory of all office equipment, furniture and devices in a locked, fireproof cabinet or in another location completely (like home).
Clearly mark all of your personal electronics, like PDAs and cell phones with identification. You can use non-removable tags or an inexpensive engraving pen.
See Original Post
Shared by IFCPP Member Allen Bohnert, CIPM
The Center for Collections Care at Beloit College (C3) provides one-of-a-kind opportunities for hands-on learning and practice for museum, library, archive, and conservation professionals and emerging professionals. Our distinctive resources—two campus museums (Logan Museum of Anthropology and Wright Museum of Art), a vibrant archive, historic costume and natural history collections—situated on the residential campus of a small, liberal arts college, provide unparalleled opportunities to gain new skills, network with other professionals, and better prepare for advancement.
The Center’s courses are taught by accomplished professionals who are committed to sharing their knowledge and expertise. The Center’s residential learning community of practice offers participants the opportunity to connect with and learn from one another. The real impact of Center for Collections Care at Beloit College training is realized when participants return to their home institutions equipped with the knowledge, skills, and confidence to effect positive change.
Learn More
Reposted from the Huffington Post
Protests erupted inside New York’s Solomon R. Guggenheim Museum Saturday night as demonstrators demanded the museum ditch its ties with the Sackler family ― the owners of Purdue Pharma, manufacturer and marketer of prescription painkiller OxyContin.
The museum’s Sackler Center for Arts Education, which includes multimedia labs and lecture theatres sprawled out over 8,200-square feet, was a gift from the family and opened to the public in 2001.
Footage of the incident uploaded to Twitter show leaflets being thrown from one of the museum’s upper walkways as some protesters staged a die-in.
Designed to look like prescription slips, the leaflets were a response to allegations made in a court filing that a member of the Sackler family had predicted the launch of the opioid painkiller would be “followed by a blizzard of prescriptions that will bury the competition.”
Oxycodone, the drug’s active ingredient, is among the most common painkillers in prescription opioid deaths. Per the Associated Press, Purdue Pharma, its executives and members of the Sackler family were recently accused of deceiving patients and doctors about the risk of opioids and allegedly pushed prescribers of the drug to keep patients on it for longer.
The museum did not immediately respond to HuffPost’s request for comment on the protests.
The latest demonstration comes after protesters targeted the Metropolitan Museum of Art last year for its ties to the family, tossing mock pill bottles into the moat at the Temple of Dendur ― housed in the museum’s Sackler wing ― which were labeled: “Prescribed to you by the Sackler Family.”
The New York Times reports that after leaving the Guggenheim, several of the protesters marched down Fifth Avenue with a barrier that read “Shame on Sackler.”
Whether regional or national, business leaders face the impact of globalization. In today’s world, it is not a question of if a crisis will affect an enterprise, but when. Events, such as a terror attack, data breach, pandemic or travel ban, that happen on the other side of the world can affect business resilience and valuation just as much as those down the street or on premise.
Threat Intelligence—delivered to key decision makers in a timely manner—is crucial for the safety of everyone. And businesses want the ability to garner relevant threat intelligence from cyber chatter most critical to the organization and report it to internal stakeholders, who can quickly act upon it. A variety of sophisticated technology tools are gaining popularity for their ability to easily integrate with security programs. Such tools aggregate, analyze and report threat intelligence in real time—for proactive security response.
Via open source data channels, social media, the dark web and other publishing platforms, customers use these types of technologies to form common operating pictures to:
Act on real-time alerts of threats such as protest activity, suspicious package, or impending disaster within a radius of interest to facilities or assets.
Monitor personalized keywords or locations across multiple social media platforms.
Share a common operating picture dashboard of an incident across their organization for collaboration and response as was the case during Hurricane Harvey.
For example, during the 2018 Winter Olympics in South Korea, TX360, a situational awareness and threat intelligence platform, helped customers stay current with relevant information such as:
Official alerts and notices of events that could potentially affect transportation
Protest and boycott information and social media content
Emergency contact and Olympic information for local law enforcement, U.S. Government departments (Embassy, Department of State) and tourism links
Mapping of the locations, and photos and videos and games schedules
In another example of situational awareness, PlanetRisk ramped up its alerting and reporting dashboards during recent bombings in Austin, Texas, to support timely updates to local organizations the company serves. The platform:
Provided location accuracy, timeliness, and context to the threats that developed over a three-week period and
Consistently delivered incident notifications of each explosion faster than larger news conglomerates.
Combined with experienced analysts, these types of services provide relevant data required to identify and understand threats to properties and implement core situational awareness programs that reduce risk and improve ROI for any organization.
By integrating platforms like TX360 and ThreatMinder into their security operation centers, or through Allied Universal’s Global Security Operating Center as a Service (GSOCaaS), customers can leverage threat intelligence in a profound way.
Reposted from Securitas Security Services, USA, Inc.
Who Is an Active Shooter?
According to Department of Homeland Security (DHS) an active shooter uses firearms to kill or
attempt to kill people in crowded or confined areas. There may or may not be a logical pattern in which an active shooter finds his victim, and the incident evolves very quickly. Such incidents are unpredictable and can happen anywhere, at any time. The triggers for such incidents could be personal anger, ideology, revenge, mental illness or many other reasons.
Active Shooter: Survival Tips
It was just another day at the office for Alex. It was noon as he stepped out of a meeting with his manager. It was time for lunch, and he walked towards the cafeteria. Suddenly, he heard a loud sound. Before he could think clearly, he heard two similar sounds followed by painful cries of people whose voices he couldn’t recognize. Then he realized what has happening. He was too shocked to move. Could he be the next target? What should he do now?
Active shooting has become a common cause of occupational fatalities in recent times, with instances occurring in schools, offices, shopping malls and other public places. It is essential to know how to react when you face such an incident. Being aware of safety strategies can help you not just stay safe, but also help save the lives of many. An untrained person is likely to react with fear, helplessness and panic. A trained person on the other it hand, can make a big difference to himself or herself, to the people around, and to the situation.
How to Respond to an Active Shooting Incident The Department of Homeland Security (DHS) recommends that when an active shooter is nearby, the best course of action would be to RUN, HIDE or FIGHT.
1. Run
· Be aware of your environment.
· Know the nearest exits and leave the building if possible. Take others along while you exit. If others disagree, evacuate alone and run/walk to a safe location. Leave your bag and other belongings behind.
· Prevent people from entering the premise.
· Call 911 as soon as you think is safe.
2. Hide
· If the shooter is nearby, or if exiting is not an option, hide in a place where you are not visible. If you are in a hallway or lobby, run to a room.
· Secure your hiding place. If you are in a room, lock it from inside, switch off the lights and block the entrance with heavy furniture.
· Be Silent! Put your cell phone on and silent mode immediately. A ring or a vibration will give away your location.
3. Fight
· This should only be done as the last resort. If running or hiding is not possible or if your life is in imminent danger and you have no other option, you can use physical force to try to take down the shooter.
· Try to incapacitate the active shooter.
· Yell at the attacker and throw things. Use any physical force available/possible to stop the shooter and defend yourself or others.
What to Say When You Call 911
Dial 911 as soon as you think it is safe. Remain calm and give the following information:
· Location of the active shooting incident.
· Number of active shooters.
· Shooter’s physical description.
· Type of arms used in the incident.
· Number of victims or potential victims present.
What to Do When Law Enforcement Arrives
· Stay calm and follow the instructions given.
· Put down items that you are carrying.
· Raise your hands and spread your fingers.
· Keep your hands visible always.
· Do not make any quick movement towards officer for safety or other reasons.
· Do not shout or yell.
Additional Resources There are a number of e-learning courses available for Securitas USA employees on workplace safety. These courses help employees understand how to detect, deter and report violent people and incidents. Topics include how-tos on recognizing potentially violent individuals and situations; preventing incidents from escalating; and properly responding to and following up on incidents. Real-life scenarios test learners’ ability to spot “red flags” potential triggers. Titles in the LMS include:
· Workplace Violence
· Shots Fired – When Lightning Strikes
· NSI Suspicious Activity Reporting (SAR): Private Sector Security Training
The SCPD Library offers courses including:
· Workplace Violence: Recognizing the Warning Signs
· Make it Safe: Your Workplace, Your Job
· Shots Fired On Campus – When Lightning Strikes
· RUN. HIDE. FIGHT. Surviving an Active Shooter Event
For more information on this and other security related topics, visit the Securitas Safety Awareness Knowledge Center at:
http://www.securitasinc.com/en/knowledge-center/security-and-safety-awareness-tips
Reposted from BBC
The work, which depicted a young female figure with a mournful expression, was cut out and removed from one of the emergency doors at the venue.
"We are today filled with a deep sense of indignation," the Bataclan tweeted.
In November 2015, 90 people were killed when armed militants targeted the venue during a rock concert.
"Banksy's work, a symbol of recollection and belonging to all: locals, Parisians, citizens of the world, has been taken from us," the Bataclan wrote in a statement posted on Twitter.
The theft, which occurred overnight on Friday, involved "a group of hooded individuals armed with angle grinders", AFP news agency reports, citing a source close to the investigation.
The suspects then reportedly drove away with the artwork in a truck.
Banksy's art has become extremely popular and sought-after. A piece of his work which appeared on a garage in the UK was recently sold privately for a "six-figure sum".
Last October, Banksy made headlines after one of his paintings was sold for more than £1m at auction by Sotheby's in London - and then immediately shredded itself.
Banksy is a famous - but anonymous - British graffiti artist. He keeps his identity a secret.
He produces pieces of work which pop up in public places, such as on the walls of buildings. A lot of his art is done in a particular style which people can easily recognize.
He began spray-painting trains and walls in his home city of Bristol in the early 1990s. But in the 2000s, he expanded his work beyond Bristol and was soon leaving his artistic mark all over the world.
Earlier this month, a piece of graffiti discovered at a monorail station in Tokyo, Japan, caused a stir for bearing resemblance to the famous Banksy painting "Umbrella rat".
Reposted from Artnet News
The Andrew W. Mellon Foundation has revealed that there’s been an increase in the number of women and people of color in leadership roles at museums, according to the second part of its Art Museum Staff Demographic Survey.
The percentage of women holding leadership roles—which the survey defines as “all executive positions,” including directors, CEOs, and CFOs—increased from 57 percent to 62 percent between 2015 and 2018. (Directorships, however, remain majority male, as do curatorial roles with management responsibilities.)
The number of people of color occupying these positions increased only from 11 percent to 12 percent in this same period. One category that saw significant change, however, was the number of African American curators, which doubled from 2015 to 2018.
The numbers “offer a snapshot of change that is overdue, slow, but also real and welcome,” said Mariët Westermann, executive vice president of the Mellon Foundation, in a statement on the findings.
The results, gathered last year and released today, are the culmination of a far-reaching survey of data from 332 art museums and more than 30,000 employees. The foundation began the survey in 2014 and published the first round of results in 2015.
The report, initiated by the Mellon Foundation, the Association of Art Museum Directors, and the American Alliance of Museums, and administered by the research firm Ithaka S+R, shows that progress has been incremental. Women remain the slight majority of total employees at art museums, though that number slips back when it comes to occupying leadership roles; likewise, museums have hired more people of color in recent years, contributing to a more diverse workforce overall, though in small doses.
Overall, the speed and frequency at which departments are hiring and promoting women and people of color is taking place largely in the curatorial and education departments, which are considerably larger on average. “While trends in recent hiring are encouraging, certain parts of the museum appear not as quick to change, especially the most senior leadership positions,” Westermann said.
There have been a growing number of initiatives dedicated to addressing the lack of diversity in museums. In July, the American Association of Museum Directors announced a paid internship program for minority college students, while the Andrew W. Mellon Foundation announced a $4 million grant targeting board diversification at museums around the country just a few weeks ago.
Reposted from TechRepublic
With more than 600 cybersecurity data breaches in 2018 alone, enterprises must be prepared to prevent and mitigate coming attacks, according to Kelvin Coleman, executive director of the National Cyber Security Alliance (NCSA), a nonprofit public-private partnership promoting cybersecurity and privacy education and awareness.
Coleman, a former cybersecurity director for the US Department of Homeland Security and the White House National Security Council, has spent his career trying to peer around the corner when it comes to technology, he said. He breaks technology down into three parts: Products, processes, and people.
It's no secret that cybersecurity should be taken seriously, said Daniel Elliott, director of small business programs at NCSA, which means the CISO should have a seat at the table for all business decisions.
"Part of that equation, in addition to using big data and insights to inform training and awareness, is to elevate the role of the CISO within the enterprise, and include them in the overall leadership of the organization," he added.
Here are three trends that will impact enterprise cybersecurity in 2019 and beyond, according to Coleman.
As many members of Generation Z enter the workforce, "none of them have ever lived in this world without their smartphone or their computers," Coleman said. "This is going to have a significant impact on the enterprise this year, and how technology is evaluated and deployed within different generations."
The rise of Gen Z in the workplace will also impact how companies use technology for fortification, defense, training, development, sales, operations, and most other parts of the enterprise, Coleman said.
The cybersecurity workforce will also slowly begin to skew younger, Coleman predicted, due to the number of open jobs available, and the number of universities beginning to add coursework in this area. "We know it's only going to grow from here," he added.
Phishing may be an old threat, but it remains one of the most successful means of attack, Coleman said. "With phishing, we know the adversary is going to continue to evolve to use phishing as a way to literally lure people to download the viruses or malware," he added. Fighting phishing means adequately training employees not to click links or download files that look suspicious, Coleman said.
These attacks are often effective because they rely on human behavior, rather than a vulnerability in a system, Coleman said.
Businesses must increase their focus on providing employee education around cybersecurity—however, there is no one-size-fits-all method, Coleman said.
"There are a lot of really great, innovative businesses out there using technology to catch the bad behaviors and then deploying either just-in-time education or sending that feedback back to the organization so they can then provide valuable insights back to leadership to design some programs," he added.
While it's important for CISOs to keep an eye on emerging technologies and threats, hackers will figure out a way to leverage those to meet their own interests, Elliot said. "But when it comes to securing the enterprise, a lot of it also comes down to not getting caught up in the new technologies so much that we forget the basics of cybersecurity—the two-factor authentication and encryption and segmenting networks," he added. "All those things are so important to organizations."
Reposted from Art Guard
While recently reflecting on the estimated $4B to $6B figure of art stolen annually I started thinking about the reasons for taking such a high risk, and I stumbled on an interesting article that lists four motives. Not all thieves are in it for the money, as opposed to, say, someone robbing a bank.
First Type: Show Me The Money.
The most obvious is one who steals for profit. They’re often sophisticated, but not always. It’s a common misconception that theft of valuable art is useless because of its high visibility in an ever shrinking world, but that fails to take into account a thief taking less money than imagined and increasing his potential buyer base, hiding it away for future opportunities, or worse, destroying it to avoid prosecution. A more recent phenomenon is selling to the Chinese market where it’s easier to find a flush buyer, with lower chances of a piece being identified than on the Western art market.
Second Type: Trophy-hunting Art Thieves
Then there are the trophy hunters. They don’t make much money at all and cause themselves endless aggravation, but they enjoy doing it either for the beauty of the art or the adrenaline kick. Remember the movie The Thomas Crown Affair with Pierce Brosnan stealing Monet’s painting of San Giorgio Maggiore at Dusk?
Third Type: Thieves With Purpose.
A third category is best exemplified by the Mafia and their history of art theft for potentially long-term goals. In particular, art can be used as a bargaining chip with authorities for any type of negotiation. And for this reason art is often traded or sold among a circle of criminal groups.
Fourth Type: Crazed Art Fan.
And sometimes it’s just a crazed art fan. “An unemployed construction worker was jailed in 2010 for stealing Poland’s only Monet and stashing it in his parents’ wardrobe. The AFP reported: The 41-year-old man pleaded guilty to the charges, saying he stole the 1882 Monet canvas titled “Plage de Pourville” from a museum in Poznan, eastern Poland, in 2000 after spending hours admiring it.”
Art theft will always be a big business and some of the famous art theft stories will stay mysteries and become great movies. If you want to read more about real life art theft that just sounds like Hollywood movies, here is a good article.
Much of art theft can be stopped by a simple alert to someone close by that a painting has been grabbed. And for galleries and small museums it does not have to be a sophisticated system. The cost effective Safe Hook is a simple and very reliable means of stopping the most common method of theft. In the words of Jacquie Littlejohn, a NYC Gallery owner “Every museum and gallery should have a case of Art Guard Safe Hooks.”
If you are curious to see how Safe Hook works, click here to learn more about how it is a very reliable solution that brings peace of mind.
Reposted from Pinnacol Assurance
When you think of OSHA compliance, hazard communication (HazCom) may not be the first thing that comes to mind. That may be why it was the second most commonly cited OSHA violation in 2017. Employers don’t often prioritize HazCom, simply because they are not familiar with the standard or they are focused on more visible workplace hazards.
One big reason employers struggle is that the OSHA Hazard Communication Standard may feel like a moving target. In 2012, OSHA aligned its standard with the United Nations’ Globally Harmonized System of Classification and Labeling of Chemicals (GHS), and future updates are expected. OSHA has expressed its intention to update HazCom 2012 to align with the UN’s latest version of GHS, which is revised every two years.
“The OSHA Hazard Communication Standard is one of the most important occupational safety standards because it ensures chemical safety in the workplace,” says Joan Brown, an Industrial Hygienist at Pinnacol. “The standard provides employees with the right to know and understand the hazards associated with the chemicals they use, and how to work with them safely.”
Learning about and staying up to date on the latest standard will help employers when developing a HazCom program or updating an existing one.
“A HazCom program describes how your organization will meet the provisions for labeling, safety data sheets and employee training. The program should also include a list of all hazardous chemicals in the workplace, how the employer will inform employees of the hazards of non-routine tasks and the hazards associated with chemicals contained in unlabeled pipes in their work areas,” says Brown. “The program must also be available, upon request, to employees.”
According to OSHA, employers can implement an effective HazCom program by following these six steps:
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us