Cover of 2016 Healthcare Crime Survey

New Release of the 2016 Healthcare Crime Survey Report

Amanda StricklandNews

The IAHSS Foundation just released the 2016 Healthcare Crime Survey Report.  This report uses the FBI’s Uniform Crime Report definitions (U.S.) and the Criminal Code Definitions (Canada) to ensure consistency for events reported. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) was established to foster and promote the welfare of the public through educational and research …

High Stakes Cyber article

Companies Can be Liable for Failing to Maintain Adequate Cyber Security

Christine L. Peterson, CPP, ISPCompliance, Intellectual Property, News, Security Program Development

How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …

response to workplace violence

FBI Workplace Violence Prevention: Readiness and Response

Christine L. Peterson, CPP, ISPWorkplace Violence

In January 2011, the FBI published Workplace Violence Prevention: Readiness and Response. This is a fairly lengthy and detailed article that is definitely worth the read. We found this information especially interesting: A handful of high-profile incidents have led to increased public awareness. However, prevalence rates show that nonfatal workplace violence is a more common phenomenon than previously believed.   …

Campus Safety article about RFPs

What is the Right RFP?

Dana Frentz, CHPA, PSPNews, Security System Bid Process and Evaluation

Ensure you get what you ask for! An RFP provides a great opportunity to specify exactly what you want in equipment or a service. Campus Safety’s article “How the Right RFP Can Ensure the Program You Buy Is the Program You Get” provides engaging aspects for developing and issuing RFPs. Many companies contract for security officers through a third-party company. …

Campus Safety article on safety during investigations

Keeping the Campus Safe during a Title IX Investigation

Christine L. Peterson, CPP, ISPCompliance, Training, Workplace Violence

Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations     Plan. Protect. Prosper. Protus3 specializes in security system design, …

Campus Safety article about guns on campus

CCP Holders and Guns on Campus

Christine L. Peterson, CPP, ISPCrisis Management Planning, News, Security Program Development, Training, Workplace Violence

Should CCP holders be allowed to carry guns on campus? There are studies that show during times of great stress, a person will experience changes that affect their physiological, sensory and cognitive processes which can prevent appropriate responses in very serious situation. These responses can affect critical decision-making processes. For example, check out the eleven reservations of a “gun guy.” …

phone keypad

Are VoIP Phones Secure?

Russell W. Gilmore, CISSP, CISM, EnCENews

A recent article identified and discussed a security flaw in VoIP phones. I am not advocating throwing away your VoIP phone system and going back to analog; I recommend educating yourself to the possible threat, measuring the likelihood of that threat in your environment, and making corrective measures if necessary. Most of the electronic devices we use on a daily …

digital forensics expert

Computer Forensics Provides Digital Evidence

Amanda StricklandComputer Forensics, News

Digital evidence provided by computer forensics can yield amazing results: find deleted materials, recover lost documents, establish a timeline of events, expose intentions, uncover crimes, and others. The breadth and depth of the field will only continue to grow as electronic devices proliferate into every aspect of life. As the demand for forensic experts, tools, and resources has increased, the …

sign that says rethink

Clery: Rethinking Your Role

Amanda StricklandCompliance, News

Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …

down the rabbit hole

Lighting at the End of the Rabbit Hole: How to Determine Appropriate Lighting Levels as Part of a Total Security Program

Dana Frentz, CHPA, PSPSecurity Assessment, Security Program Development

Beginning Down the Rabbit Hole We all know the use of lighting alone does not stop crime, but the effects of good lighting coupled with additional security measures have been shown to reduce the occurrence of crime. Lighting can elicit an emotional response, providing a level of confidence and the feeling of security. It can also provide a decrease in …