This past April, TrackTik successfully met the criteria set out by the AICPA (American Institute of CPAs) to comply with SOC2 Type II Security Principles. What’s SOC2? We’re glad you asked because for us, as a security-minded organization, it’s an important step in ensuring our clients’ security.
One thing is crystal clear: we all need mentors. From helping us make difficult business decisions to providing on-the-spot advice to shaping the trajectory of our careers, we can learn valuable lessons from our mentors. TrackTik introduces two successful women leaders who not only credit their mentors with helping them choose careers in the security…
In an industry that is constantly responding to changes in technology and evolving threats like the COVID-19 outbreak that has brought much of the world to a standstill, security service providers are challenged to keep up to date and adapt existing solutions quickly to keep their client’s property, employees, and data safe.
Given the evolving situation of the COVID-19 coronavirus, TrackTik has put together a primer on the available resources from our Security Industry Associations. We will continue to provide you with additional resources as they become available.
Is your security strategy at the top of your organisation’s list of priorities in 2020? If not, maybe it should be. There’s no denying that the UK saw an increase in crime at places where people conduct business over the past year. Businesses were hit with offences like shoplifting, burglary, and criminal damage at a…
To celebrate Black History month, we like to introduce you to one of the most senior members of our team, Jerry R. Ishmael, our Client Support Manager, who helps TrackTik develop and maintain its inclusive culture.
Considering how big the security industry is, it is impressive how small it is at the same time. Of course, when we say small, we are talking about the network that exists of security professionals. Let's get started.
In October, Microsoft announced that they would be dropping support for TLS 1.0 and TLS 1.1. Apple and Google swiftly followed suit with their own announcements on the very same day. This means that TLS 1.2 will effectively become the default protocol, with websites and companies encouraged to add support for TLS 1.3 as soon as…
Hospitals require specialized security like no other sector of the physical security world. Ken Close is very familiar with this fact and shared his insight on the developments and progress in Healthcare security.
Dave Tyson and Mark Folmer discuss the changing role of the CSO and how security is no longer a necessary evil to an organization. Read more about this large shift for the industry here.
When responding to a request for proposals (RFP) for security services, there are a few tricks to make sure you’re bidding on the right contracts, and that you’ll win the ones you do go for. Read our latest blog on RFP response best practices for successful bidding.
To commemorate Canadian Security Magazine’s 40th anniversary, Mark Folmer discusses the legacy of ASIS International in the Canada security industry.