You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …
What is “Ban the Box” and What Does it Mean to You?
Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …
Five Computer Forensics Myths Debunked
The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …
See Something. Say Something. Then What?
We all have heard at one time or another “If you see something say something.” It’s a way for the public to observe and report suspicious activity that may be an indicator of recent crimes or future crimes. The opportunity came for me to say something at a fast food restaurant in a busy section of town. While pulling into …
Prevention or Mitigation: Which Do You prefer?
How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …
Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case
It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …
What Can We Learn From Baylor University?
The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …
National Cyber Security Awareness Month (NCSAM) – Week 4
NCSAM Week 4 – Resources The National Cyber Security Alliance, the other STOP. THINK. CONNECT. ™ founding organizations and many of our partners have created resources, ranging from tip sheets to posters to videos and more, to help you stay safer and more secure online and better protect your personal information. All of these resources are free to use, download …
National Cyber Security Awareness Month (NCSAM) – Week 3
Keep a Clean Machine A STOP.THINK.CONNECT. sub-campaign designed to help everyone understand the importance of protecting Internet-connected devices from malware and infections – especially malware that connects your devices with botnets. Keeping your Internet-connected devices free from malware and infections makes the Internet safer for you and more secure for everyone. The Keep a Clean Machine campaign is an ongoing …
National Cyber Security Awareness Month (NCSAM) – Week 2
Own Your Online Presence A STOP.THINK.CONNECT. sub-campaign that inspires individuals to consider the privacy implications of their online actions, helping them to make informed decisions and better understand the choices and tools available to manage their privacy online. As our digital lives become more connected, it is increasingly important that we all protect our personal information and manage our privacy. …








