Main Slide Show
Workplace Safety & Health Company IH consultants are trained to inventory and assess confined spaces of various types and sizes.
Industrial Hygienists may wear Hazmat or other chemical protective clothing when evaluating highly hazardous atmospheres or environments.
An IH consultant uses sound level meters to assess noise levels in industrial environments.
Industrial Hygienists place noise dosimeters on factory employees to monitor employee exposure to noise levels.
Lockout/tagout involves assessing a machine’s operation and identifying all energy sources.
Tagout of electrical switches in a control room warns employees not to start equipment.
An Industrial Hygienist uses an X-Ray Fluorescence (XRF) analyzer to determine lead-based paint concentrations on a facility’s exterior.
We do air sampling for airborne contaminants using sorbent tubes.
Industrial Hygienists use a filter cassette equipped with a cyclone to collect respirable dust samples.
We’ve heard the news stories of major companies having data breaches – including credit card companies, hospitals, and airlines. The list goes on! Most breaches occur in North America with an estimated average cost of a data breach being over $150 million by 2020. Creating a culture of cybersecurity is critical for all organizations, and one of the first steps to protecting your business from a cyberattack is implementing a cybersecurity checklist with all the necessary precautions in place. Keeping these steps in mind can save you and your employees in a world full of hackers:
• Limit physical access to your sensitive information – make sure your servers are not accessible to visitors or employees without security clearance
• Physically secure network access points – i.e. employee workstations, WiFi outlets. If you allow guests to use your company WiFi, make sure they have no access to your inner network and that your router and other devices are password protected
• Conduct employee background checks – it is important to take potential insider threats into account as your own employees can pose the biggest threat to your company’s data
• Educate your employees on the risks of cyber threats and proper habits/best practices to keeping not only the company’s data out of harm’s way, but their own sensitive data – make sure they know who to contact in case they suspect a security breach while at work or on work computers
• Configure and maintain firewall and anti-virus protection – and always keep it up-to-date; also a good idea to limit and filter out questionable websites which could be havens for dangerous malware
• All communications should be encrypted and monitored, including traffic monitoring which can detect suspicious network activity
• Maintain redundant connections for critical systems, so your network can continue to run if your security is compromised
• Establish regular backups and store them in a secure manner – preferably in an inaccessible location separate from your main network
These steps help create a security perimeter and safeguard your data from such attacks as malware, ransomware and other external breaches. Protecting your business’s data is just all-around good business as your customers are at risk when your business is hacked or has a security breach. Creating a culture of privacy is a win-win for all – except the hackers! And that’s fine with us!