two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

investigation

What kind of background investigation do I need?

Tasha Dyson, CFE Background Investigation

  We conduct a wide variety of background investigations for a lot of different reasons. Sometimes we’re conducting due diligence on companies who want to do business together. Other times it’s a threat assessment as part of an employment termination. Sometimes we’re conducting a background investigation in support of a larger investigation, like fraud or employee misconduct. Our most common …

two different panels

Why should we have security standards?

Dana Frentz, CHPA, PSP Security Planning, Security System Design Development, Security System Lifespan Management

Have you ever seen a situation where there seems no rhyme or reason for the placement of security devices? Wouldn’t it be wonderful to be able to hand your architect, engineer, or integrator a document and know that they have the specifics of what product you want and how you expect those products to be installed and function? Well, you …

angry man

Workplace Violence: What is a Threat Assessment?

Tasha Dyson, CFE Workplace Violence, WPV Support, WPV Threat Assessment

What is a threat assessment? One of the things clients frequently ask us has to do with workplace violence. Usually it goes something like this. We get a call from a company. They’re going to fire someone fairly soon, and they’re not sure how he’s going to react. They’re contacting us to see what sort of support we can provide. …

video security device

Seeing Security

Eric Martindale, CPP, CPD Security Schematic Design

This post was prompted by an initial project meeting and an annual tradition of watching a favorite movie around Christmas. During an initial project meeting, right after introductions, the Architect made a request. The Architect stated that the Client wanted all security devices to be invisible. In a previous conversation, I heard some examples of the measures to conceal devices. …

A Year and a Day Podcast

Protecting Your Electronic Devices and Data during a Divorce

Protus3 Computer Forensics

People often have questions about how to best protect their children and their assets during a divorce, but one area that they often overlook is protecting their data and making sure that their spouse can’t access their devices accidentally or otherwise. In this episode host Jaime Davis of Gailor Hunt explores this topic with Rusty Gilmore, a Security Consultant and …

A Delicate Balance, part 2 – Law Enforcement

Chuck Hurst News

During “normal” times the police generally control the masses because the masses allow that control. Or to put it another way, the public allows law enforcement to do their jobs. Thus the delicate balance and fragile trust relationship is born. These are not normal times! Just consider that within the framework of racial strife, societal unrest, police misconduct, political polarization …

HPG article

Truth or Consequences? Choose Investigators Wisely

Tasha Dyson, CFE Compliance, Corporate Compliance

A recent article from HPG provided excellent information about how companies and organizations can take a proactive stand against harassment (read the original article here). As part of the precautions to take, the article recommended an investigation of the complaint. We couldn’t agree more. Few organizations realize that private investigators offer a vast and virtually untapped pool of investigative talent. …

layered security

Layered Security and COVID-19

Chuck Hurst News, Security Program Development, Uncategorized

At Protus3, we take great pride in helping our clients identify risks and develop practical and sound strategies to manage, mitigate, and leverage those risks.  Usually those risks involve insider or outsider threats carried out by persons with nefarious intent. The threats come in various forms – overt and plainly visible (think intruder) or covert and not plainly evident (think …