two different panels

Why should you have security standards?

Dana Frentz, CHPA, PSP Security Program Development, Security System Design Development, Security System Lifespan Management

Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …

coronavirus COVID-19

Workplace Violence and Coronavirus Disease – 2021

Protus3 News, Workplace Violence

“We’re beginning to realize that coronavirus disease, COVID-19, will be an event burned into our minds and hearts for generations.” This was written by Chris Peterson, former President of Protus3, in March 2020. Little did we know then just how much COVID-19 would affect us and change who we are. “Most of our workforce today has nothing by which to …

graphic from article

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

safety and security

What’s the difference between safety and security?

Protus3 Security Assessment

I am Megan Keenan, the Business Development Manager here at Protus3. One of the first things I learned after I joined the team was the difference between safety and security. A lot of times, these two words are used interchangeably. People say safety when they really mean security. Both safety and security are concerned with keeping people from harm and …

potential executive

Executive Level Background Investigations

Tasha Dyson, CFE Background Investigation

Let’s say you’re about to hire a new CFO. He’s been a CFO, comptroller, and vice president in the last 10 years at three different companies. All the right skills and qualifications are listed on his resume. He’s had several interviews, and he’s fantastic. He’s had the right answer to every question you’ve asked. You’ve heard nothing but good things …

criminal record

Background Investigations: Reading between the Lines

Tasha Dyson, CFE Background Investigation

Recently, we were working on a pre-employment background investigation where the scope of work was limited to a criminal search. When we looked at the criminal history of the applicant, we saw the image on the right. What do you see? The subject has charges and convictions for identity theft and drugs, but what else? I see a pretty decent …

screenshot of metadata

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

county records

What is a “nationwide criminal search”?

Tasha Dyson, CFE Background Investigation

We’re asked all the time if we offer a “nationwide criminal search” or a “multi-state criminal search”. The answer is always “No.” Why not? Because it just doesn’t exist. Let’s talk about courts and criminal records in the US. No national database exists Currently, there is no comprehensive national database for all the criminal records in the US. Yes, the …

two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

investigation

What kind of background investigation do I need?

Tasha Dyson, CFE Background Investigation

  We conduct a wide variety of background investigations for a lot of different reasons. Sometimes we’re conducting due diligence on companies who want to do business together. Other times it’s a threat assessment as part of an employment termination. Sometimes we’re conducting a background investigation in support of a larger investigation, like fraud or employee misconduct. Our most common …