Mike Tucker c. 1991

Celebrating 30 Years – Team Tucker

Protus3 News

Knowing your WHY can help you act with purpose. –Simon Sinek Imagine for a moment that it is 1988. Picture a young man with a very good job, a beautiful wife, and three very young children. For many of us, earning a good living and providing for our families is all the “Why” we need…but not for Mike Tucker. Why …

Campus Safety Article

Parents So Concerned about School Safety They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISP News, Security Program Development, Workplace Violence

Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. The sanctity, security and safety of students, faculty, staff and infrastructure on all campuses should be a foregone conclusion. Unfortunately, it is not. Time and time again we have been horrified by …

surveillance

IP Cameras and Video Settings

Kevin M. McQuade, CPP Security System Lifespan Management, Security System Testing and Commissioning

Recently, one of our clients noticed that they were not getting a full 30 days of online video storage from a particular security camera video server that had recently been installed. This client has a very large video management system (VMS) with multiple servers spread out through multiple facilities. The majority of the other servers were performing well and were …

HPG article 2018-08

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Theft by employees costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI is tasked with investigation many categories of crimes. As a result, they receive many tips that can be beneficial to the public when passed along. I can say with experience that the FBI his increased the process of alerting the public and educating the public about certain security and safety issues that they find to be most reported …

US-CERT

Back-to-School Cyber Safety

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Security Program Development

It is that time of year again for many parents. We are sending our children back to school. They have their phones, tablets and computers and are ready to start a new year. This is the perfect time to think about their safety. One such safety category is keeping your children safe online. The United States Computer Emergency Readiness Team …

time

Why does it take so long?

Tasha D. Dyson Background Investigation

Time continues to be the number one challenge for employers in the background screening process. That was one finding in the study entitled “How Human Resource Professionals View the Use and Effectiveness of Background Screening Methods” published by NAPBS and HR.com in June 2018. You can read the entire report here. What wasn’t reported was the expectation of the survey …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomeware, which allows attackers to hack into remote desktop services connect to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services connection into your network from the internet. …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. Most are missing the largest risk to their data, the employee. A recent study finds that nearly two in five workers admitted to clicking on a link or opening an attachment …

Kevin McQuade

Kevin McQuade Attends ADI Raleigh Expo

Protus3 News, Security Product Evaluations

Kevin McQuade from Protus3 attended the annual ADI Raleigh Expo at the North Raleigh Hilton on July 26, 2018. This one-day event included seminars throughout the day that focused on the security industry and consisted of business techniques and practices, technical information for security and video components, how the internet is impacting security, network basics, wireless technology and others. This …