Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

Technical Assessments – Installation and Maintenance Issues

Dana M. Frentz, CHPA Security Assessment, Security Survey, Security System Lifespan Management

This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

You’ve Conducted a Background Check… Now What?

Protus3 Background Investigation

Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …

What is Your Security Culture?

Tasha D. Dyson Security Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

SSI access control article

Addressing Access Control

Jerry T. Blanchard, Jr., CPP News, Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …

Training to Respond to Workplace Violence

Christine L. Peterson, CPP, ISP Training, Workplace Violence, WPV Training

Last month I wrote about the importance of training as a security tool to support best outcomes in a security event. That post specifically addressed workplace violence and active shooters. Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect us is important for our wellbeing and best outcomes. …

Reflections on Virginia Beach

Tim Bullock News, Security Assessment, Security Survey, Security Threat Assessment, Training, Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Friday was a very sad day for the city of Virginia Beach as well as our country. Yet another senseless and tragic mass shooting has taken place and has left us with many questions. Why did this happen? How did this happen? Finally, what could have been done to prevent this from happening? Hearts are broken and loved ones have …

Workplace Violence Gets Personal

Christine L. Peterson, CPP, ISP Training, Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Last night I had the opportunity to address the Raleigh Financial Executive Networking Group (FENG) and lead a presentation on Managing Aggressive Behavior & Workplace Violence (workplace violence). This particular opportunity to train industry leaders was especially meaningful to me as I was giving thanks for the safety of one of my nieces. She attends STEM School Highlands Ranch where …