Mike Tucker c. 1991

Michael K. Tucker


Michael K. Tucker founded Risk Management Associates, Inc. (now Protus3) in January of 1988. His vision came out of a need that he recognized in the security arena for a company that acted as an independent security partner for companies and agencies in the protection of their business assets. Mike’s vision was a company founded on the principles of integrity, …

list of security systems

Commissioning: Last But Not Least

Protus3Security System Testing and Commissioning

When investing in an electronic security system, the process is generally the same. Systems are evaluated, designed, installed, programmed, and then turned over to the end user customer. Sound about right? In some instances, owners often overlook the final step – system commissioning. What is commissioning? The basic definition of commissioning is reviewing and testing the systems to verify they …

Preparing for Switzerland

Protus3Security Program Development

We are excited to announce the opening of our office in Switzerland! Since 1988, we’ve helped clients with security in almost all 50 states and at least 28 countries. Because of our current projects and relationships, it’s time for us to open a European office. So who gets to go to Switzerland? Marty McClanahan. Marty has had a significant career …

Ban the Box

Ban the Box, But Get the Data

Tasha Dyson, CFEBackground Investigation

A person should not be prohibited from getting a job simply because they have a criminal conviction. However convictions for certain crimes might prevent a person from getting certain jobs. Let’s set some ground rules for our discussion. First we’re talking about convictions, not charges. To put it in simple terms, the judge said “guilty” and banged the gavel. Second, …

QR code Protus3 holiday card

A Quick Response Isn’t Always the Best Response

Amanda StricklandComputer Forensics

Recently both state and federal officials have been sending out alerts related to malicious QR (quick response) codes. With the increased use of QR codes, scammers are turning to this technology and redirecting victims to malicious websites. So what is a QR (quick response) code? Basically, it’s a series of squares arranged in a matrix or grid shape to create …

building at night

Security Lighting

Dana Frentz, CHPA, PSPSecurity Assessment

This is the first in a series of videos that Protus3 will be doing on lighting, specifically, security lighting. Ideally, lighting should be designed so that a person feels as secure at night as they do during the day. Lighting is very subjective. It invokes feelings that in turn provide a choice. Lighting in and of itself does not stop …

angry man

The Impact of Return to Work

Protus3Workplace Violence

In a recent speaking engagement, Jerry Blanchard, President and CEO, discussed the impact of return to work. What do employees expect when they return? How has working from home changed the culture of your business? Does this change your vision? How has this changed the company’s critical assets? While we can’t reproduce the entire presentation here, we wanted to provide …

secure network

Secure Your Network

Russell W. Gilmore, CISSP, CISM, EnCECrisis Management Planning

As technology becomes more intertwined with our daily lives, the “bad guys” will continue to find vulnerabilities and gain access to private accounts and data. Because of this, it is important to secure your network and data. A best practice is to implement multiple security measures to minimize potential threats. Antivirus programs, virtual private networks (VPNs), and complex passwords are …

ThreatPost article

Leaked Data and Targeted Attacks

Russell W. Gilmore, CISSP, CISM, EnCEIntellectual Property

How can leaked data cause a targeted attack? Have you ever wondered why you got a suspicious email from a bank where you have an account? How about the emails about needing to change a password for a service? Let’s not forget the calls to your cell about your power being cut off or your computer being hacked. The information …

bring your own device

Security Concerns for Personal Devices in the Workplace (BYOD)

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

We first addressed personal devices in the workplace back in 2018. That seems like such a long time ago now. With record numbers of employees now working from home due to COVID, how should we think about personal devices in the workplace? What are some of the security concerns that you should address? When work occurs on personal devices, how …