evaluation factors

Reflections on Virginia Beach

Amanda StricklandNews, Security Assessment, Training, Workplace Violence

Friday was a very sad day for the city of Virginia Beach as well as our country. Yet another senseless and tragic mass shooting has taken place and has left us with many questions. Why did this happen? How did this happen? Finally, what could have been done to prevent this from happening? Hearts are broken and loved ones have …

Workplace Violence Gets Personal

Christine L. Peterson, CPP, ISPTraining, Workplace Violence

Last night I had the opportunity to address the Raleigh Financial Executive Networking Group (FENG) and lead a presentation on Managing Aggressive Behavior & Workplace Violence (workplace violence). This particular opportunity to train industry leaders was especially meaningful to me as I was giving thanks for the safety of one of my nieces. She attends STEM School Highlands Ranch where …

dragon

Nationwide Criminal Search: A Persistent Myth

Tasha Dyson, CFEBackground Investigation

Dragons. Mermaids. Fairies. The Loch Ness Monster. Bigfoot. Leprechauns. Nationwide criminal searches. All are mythical creatures. We’re asked all the time if we offer a “nationwide criminal search” or a “multi-state criminal search”. The answer is always “No.” Why not? Because it simply doesn’t exist. When you talk about a “nationwide criminal search” or a “multi-state criminal search”, what do …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, Security Program Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

Campus Safety Article

Campus Security: Parents So Concerned They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISPNews, Security Program Development, Workplace Violence

Campus security and safety of students, faculty, staff and infrastructure should be a foregone conclusion. Unfortunately, it is not. Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. Active Shooter Events Time and again we are horrified by active shooter events targeting …

surveillance

Video Management Optimization with IP Cameras and Video Settings

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

The Problem Recently, one of our clients with a very large video management system (VMS) noticed they were not getting a full 30 days of online video storage from a particular security camera video server that they recently installed. This client has multiple servers spread throughout multiple facilities. The majority of the other servers were performing well and were obtaining …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFECompliance, Security Program Development, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …