Mail rooms and others need well-defined protocols for dealing with suspicious packages A suspicious package can be described as any container—a box, backpack, briefcase—that is left unattended and is out of place. If a building or facility is accessible only to employees, the package may simply be misplaced. Still, contact security and the building manager for a visual inspection. If the package appears to have wiring or a timing device, call law enforcement and take steps to evacuate the area around the package or the building.At the front line of mail delivery, some mail rooms have installed a small x-ray machine for screening incoming packages. “Don’t let [delivery services] just drop packages into the lobby,” Bordes says. One client, an insurance company, received so many threats in the late 1990s because of canceled policies that it installed a bomb container with a blow-out wall in the mailroom that protects the rest of the building from an impact. “Teach people not to panic, or to move or touch the package,” Michelman says. “We’ve had people actually bring a package down to security and say, I’m concerned about this!’ The likelihood is that a suspicious package is not going to be anything dangerous, but clearly all precautions need to be taken.” See related CSO story “How to Handle a Bomb Threat”. Related content news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Budget Pricing news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware news Venafi taps generative AI to streamline machine identity management Venafi’s Athena, based on a new large language model (LLM), offers users a natural language interface and provides developers with automated code generation for important integrations. By Shweta Sharma Sep 20, 2023 6 mins Generative AI Identity Management Solutions Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe