Cameras Vulnerable To Hacking During Skype Calls
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
Archive:
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
This document presents the findings of a pilot empirical survey study on the impact of counterterrorism measures on humanitarian action.
This aide-memoire aims to provide security guidance to staff undertaking a field visit.
The purpose of this paper by Harriet Moynihan (2016) is to set out a clear statement of the law on aiding and assisting as it stands, with particular regard to its application in situations of armed conflict and counterterrorism. The…
This paper by Kate Jones (2017) outlines elements of the UK regulatory framework that do or could adversely affect humanitarian action in areas controlled by NSAGs.
Overview The Dutch Security Network is an informal network of NGOs who are interested to discuss organisational security matters. The network exists since 2006 and has more than 40 participating NGOs. The network has a steering committee consisting of 5…
In this blog, Alex Marriage briefly outlines the security risks that aid workers can and have faced due to counter-terrorist financing (CTF) measures and goes on to describe the international mechanism through which CTF measures are developed and evaluated. Alex goes on to outline the recent changes to CTF recommendations and what this might mean for humanitarian NGOs.
In this blog, Alex Marriage briefly outlines the security risks that aid workers can and have faced due to counter-terrorist financing (CTF) measures and goes on to describe the international mechanism through which CTF measures are developed and evaluated. Alex goes on to outline the recent changes to CTF recommendations and what this might mean for humanitarian NGOs.
People management has a direct impact on security risk management. This module takes a closer look at the employee cycle and identifies the practices in people management which carry an obligation or risk. This module demonstrates that the best solution…
People management has a direct impact on security risk management. This module, developed by Christine Williamson, takes a closer look at the employee cycle and identifies the practices in people management which carry an obligation or risk. This module demonstrates that the best solution for good people management integrates security risk management with all stages of the employee cycle.