Technical Assessments - Standards

Technical Assessments – Standards

Dana Frentz, CHPA, PSP Security Assessment, Security Master Planning, Security Survey, Security System Lifespan Management

Our first post reviewed enclosure conditions and installation practices found in technical assessments.  We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …

spectrum of workplace violence

Workplace Violence – What You Permit, You Promote

Christine L. Peterson, CPP, ISP Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Why are we so surprised by workplace violence when we are willing to accept these unacceptable behaviors from our leaders? Is it possible that the key underlying issue is much bigger than the sum of all of these things? Let’s consider the effects of the internet, social media, 24-hour news, and other factors. For instance, there are wide-spread examples of …

Field Devices

Technical Assessments – Field Devices

Dana Frentz, CHPA, PSP Security Assessment, Security Survey, Security System Lifespan Management

In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

Technical Assessments – Installation and Maintenance Issues

Dana Frentz, CHPA, PSP Security Assessment, Security Survey, Security System Lifespan Management

This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

You’ve Conducted a Background Check… Now What?

Protus3 Background Investigation

Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …

What is Your Security Culture?

Tasha Dyson, CFE Security Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

SSI access control article

Addressing Access Control

Jerry T. Blanchard, Jr., CPP News, Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …