For companies that advertise nationwide records checks, are you getting a house of bricks or a house of cards? Do you remember that scene from My Cousin Vinny when Vinny talks about the prosecution’s case, bricks, and playing cards? “The DA’s going to build a case. Building a case is like building a house. Each piece of evidence is just …
Key Control
So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …
Hidden Costs of Security Problems
What are the hidden costs of security problems? On Wednesday, April 10, 2013, staff members at the Louvre in Paris staged a protest, and the museum did not open. (Read the full story from the BBC here.) They were not protesting about wages, benefits, or hours. They were protesting about a security problem. Pickpockets are apparently a huge problem at …
Identity Theft – Where’s Your Wallet?
Identity theft is talked about constantly, and when it happens to someone, their response is normally “I don’t know how this happened to me”. Sometimes it is just too easy. On a recent business trip – to a security conference no less – as we walked into a restaurant for breakfast we passed an empty booth with no one close …
Lessons from Lone Star College System
On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …
Security Threat Assessments for Education
In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …
The Webcam – Who’s Watching You?
Predators could be spying on you through your computer’s webcam. Criminals are now able to hack in and watch your every move – without you ever knowing it. Scary, right? We’re all guilty of it: we use our computer, get distracted with something, and just walk away. We forget the computer is still on – and this is the key …
Probability and Criticality
When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …
Matching Records – No Full Names Please
We have a client (let’s call them Sub) who is obtaining criminal history information as part of their compliance to another company (let’s call them Prime). Prime states that Sub should “Provide a criminal record check with the applicant’s full legal name.” Sub contracted with RMA to provide that information. When we search, we don’t limit our results to the …
Lock Your Computer
The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …










