On March 1, 2012, Google will implement a new privacy policy. This new policy will affect any data Google has collected on you prior to that date, along with data collected from then on. Under the new policy, your Google Web History can be combined with other data Google has gathered about you from other services like Gmail, Google+, and …
Eye Scanners at England Airports Turned Off
Many companies or organizations assume that the addition of technology can be the single solution to a security concern. Companies and organizations depend upon these technologies only to find out later, and after considerable expense, that the technology may not be all it was presented to be. It is always important to remember that the technology is only as good …
When Employees Leave, Data Should Stay
As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …
Chinese Hackers Breached Nortel for Years
Why is your company in business? You’re probably thinking, “That is obvious. We provide a superior product or service that our customers need.” This leads to three key questions: Do you know what your economic advantage looks like? Are you protecting your economic advantage adequately? How early can you identify leaks and do you have a plan to stop the …
Iran Reports Killing of Nuclear Scientist in ‘Terrorist’ Blast
Move over Bering Sea crab fishermen. There is a new “Most Dangerous Job in the World” – scientist in the Iranian nuclear weapons program. The assassination in January was the fourth in two years. This is another successful use of a motorcycle team to attach a small but effective explosive device to a car trapped in traffic with immediate initiation. …
Online Impersonation
Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …
Fine Tune Your Criminal Background Checks
Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …
Five Keys to Mobile Phone Security
Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …
State of the State: North Carolina Intelligence Community
Think of security as a three-legged stool. If you remove any of the legs the stool will not stand. The legs of the security stool are a motivated opportunist, access to an asset, and the perception by the opportunist that they have a “good” chance of being successful in gaining the asset. As a security consulting firm, Risk Management Associates, …
Recorded Video – There When You Need It
Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …







