locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCE Blog, Computer Forensics, Corporate Compliance, Investigation, Security, Security Planning

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are …

Mike Epperly

RMA Welcomes Michael Epperly as Director of Investigations

Protus3 Background Investigation, Corporate Compliance, Investigation, News, Security, Security Information, Security Planning, Training

Risk Management Associates, Inc. (RMA), recently reengaged Michael Epperly to lead our investigations division. Michael previously served as RMA’s vice president and general counsel. Mike’s experience as a consultant, investigator and attorney make his addition a valuable asset to both RMA and its clients. Michael is a graduate of Campbell University and former law enforcement officer and will serve as …

Christine Peterson

Chris Peterson Guest Speaker on WCOM 103.5

Protus3 Corporate Compliance, Fraud, Investigation, News

On Tuesday, April 1, 2014, Chris Peterson was the guest speaker on the program “Focus on Business” hosted by Lea Strickland which aired on radio station WCOM 103.5. “Focus on Business” provides insights, information and perspective on building strong businesses, sustainable businesses that build sustainable communities. Guests include area business leaders, experts and professionals who share their experience. If you …

iPad and iPhone

Bring Your Own Device or BYOD

Christine L. Peterson, CPP, ISP Blog, Corporate Compliance

In business, leaders are very often the conduit between an organization’s vision and the realization of that vision. They are charged with creating an environment that will support the team or teams within the organization to maximize innovation, productivity, and efficiencies and theoretically grow profits and market share – to live to fight another day. The focus on innovation, productivity, …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Blog, Corporate Compliance, Security, Security Planning

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

new model of leakage

Employment Law: Can You Police Social Media?

Protus3 Blog, Corporate Compliance, Investigation, Security

Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …

dictionary shown through glasses

Massachusetts Drug Lab Scandal

Christine L. Peterson, CPP, ISP Background Investigation, Blog, Corporate Compliance, Fraud, Investigation, News, Security

On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …

employment application

Yahoo Chief Executive Scott Thompson Steps Down

Tasha D. Dyson Background Investigation, Blog, Corporate Compliance, Fraud

Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …

BP texting

Government Files First Criminal Charges In BP Oil Spill

Michael R. Epperly, Esq. Blog, Computer Forensics, Corporate Compliance, Investigation

As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …

cargo plane

FedEx Settles Charges of Causing, Aiding and Abetting Unlicensed Exports

Christine L. Peterson, CPP, ISP Corporate Compliance, News

In 2010, Michael R. Epperly, Esq. who heads RMA’s Corporate Compliance consulting arm, wrote an insightful article that addressed the corporate compliance challenges that American companies face in the global marketplace. Through his experience as legal counsel, investigator, and consultant he is acutely aware of the importance of a solid corporate compliance program to an organization and the penalties that …