background screening report

What Should You Expect in a Background Screening Report?

Tasha Dyson, CFEBackground Investigation

You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …

criminal history question on application

What is “Ban the Box” and What Does it Mean to You?

Tasha Dyson, CFEBackground Investigation, Compliance, News

Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …

digital forensics expert

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …

suspicious bag

See Something. Say Something. Then What?

Amanda StricklandTraining

We all have heard at one time or another “If you see something say something.” It’s a way for the public to observe and report suspicious activity that may be an indicator of recent crimes or future crimes. The opportunity came for me to say something at a fast food restaurant in a busy section of town. While pulling into …

plan, protect, prosper

Prevention or Mitigation: Which Do You prefer?

Christine L. Peterson, CPP, ISPCompliance, News

How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …

Campus Safety article about Penn State fine

Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case

Christine L. Peterson, CPP, ISPCompliance, News

It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …

Baylor University headline

What Can We Learn From Baylor University?

Amanda StricklandCompliance, Security Program Development, Training

The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …

Stop. Think. Connect.

National Cyber Security Awareness Month (NCSAM) – Week 4

Amanda StricklandIntellectual Property, News, Training

NCSAM Week 4 – Resources The National Cyber Security Alliance, the other STOP. THINK. CONNECT. ™ founding organizations and many of our partners have created resources, ranging from tip sheets to posters to videos and more, to help you stay safer and more secure online and better protect your personal information. All of these resources are free to use, download …

Stop. Think. Connect.

National Cyber Security Awareness Month (NCSAM) – Week 3

Amanda StricklandIntellectual Property, News, Training

Keep a Clean Machine A STOP.THINK.CONNECT. sub-campaign designed to help everyone understand the importance of protecting Internet-connected devices from malware and infections – especially malware that connects your devices with botnets. Keeping your Internet-connected devices free from malware and infections makes the Internet safer for you and more secure for everyone. The Keep a Clean Machine campaign is an ongoing …

Stop. Think. Connect.

National Cyber Security Awareness Month (NCSAM) – Week 2

Amanda StricklandIntellectual Property, News, Training

Own Your Online Presence A STOP.THINK.CONNECT. sub-campaign that inspires individuals to consider the privacy implications of their online actions, helping them to make informed decisions and better understand the choices and tools available to manage their privacy online. As our digital lives become more connected, it is increasingly important that we all protect our personal information and manage our privacy. …