new model of leakage

Employment Law: Can You Police Social Media?

Amanda StricklandCompliance

Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …

dictionary shown through glasses

Massachusetts Drug Lab Scandal

Christine L. Peterson, CPP, ISPBackground Investigation, Compliance, News, Theft, Embezzlement, and Fraud

On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCECrisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

Security Design

The Death of Picture Perfect™

Jerry T. Blanchard, Jr., CPPSecurity Program Development

Picture Perfect™, one of the most powerful, proven and widely deployed security management systems in the world is being absorbed by the competition. We all saw it coming, with the acquisition of GE Security by United Technologies Corporation (UTC), and now the “end of support” looming toward the end of 2015. It sounds like a long time, but to transition …

iPhone and iPad

Apple Unique ID Numbers

Russell W. Gilmore, CISSP, CISM, EnCETheft, Embezzlement, and Fraud

Hackers have posted online the unique ID numbers for more than one million Apple devices. As claimed in news reports, the file was obtained through phishing. A hacker intercepted an email sent to several dozen FBI agents. In the header of the email were all of the agents’ email addresses. The hacker crafted emails that appeared to come from legitimate …

front page news

Front Page News for All the Wrong Reasons

Amanda StricklandBackground Investigation, Security Program Development, Workplace Violence

Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …

people texting

Legal Requirements as Mobile Devices Inundate Offices

Amanda StricklandCompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Intellectual Property, Security Program Development

By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …

employment application

Yahoo Chief Executive Scott Thompson Steps Down

Tasha Dyson, CFEBackground Investigation, Compliance, Theft, Embezzlement, and Fraud

Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …