We’ve all heard the saying “necessity is the mother of invention” (or innovation). That is absolutely true today. During COVID-19, we have not seen a big shift in how businesses are set up. What we are starting to see is a major shift in multi-disciplined teams working together. As someone who has helped companies develop multi-disciplined risk assessment teams, I …
Remote Work Involves These 3 Cyber Security Risks
A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …
Remote Monitoring Software and COVID-19
We find ourselves in very unique times. As of April 3, 2020, there are 311 million people in at least 41 states, three counties, eight cities, the District of Columbia and Puerto Rico being urged to stay home. This rapid change has put many employers in a position to allow employees to work from home. Because of that, employers are …
Background investigations and COVID-19
In a typical week, I spend a good part of my time conducting background investigations. So what’s different now that we’re all dealing with COVID-19? Honestly? Not much. Nearly every background investigation we conduct includes a criminal search. For locations where the process is automated (i.e. records are online), there is no change based on COVID-19. Records were readily available …
Workplace Violence and Coronavirus Disease
We’re beginning to realize that coronavirus disease, COVID-19, will be an event burned into our minds and hearts for generations. Employees are not receiving paychecks, and unemployment benefits are lagging behind the need. Families, companies, and governments are being pushed to historic limits. When reality finally sets in, there are going to be reactions, including an increase in workplace violence. …
5 Ways COVID-19 Affects Workplace Security
As we make adjustments to flatten the curve and slow the spread of COVID-19, we’re changing our behaviors in the workplace. We’re all washing our hands more frequently. We’re practicing social distancing. As much as we can, we’re working from home. Our responses to COVID-19 are important, but how do our changed behaviors affect security at work? What security issues …
Christine Peterson Named C-Suites Award Winner
The Triangle Business Journal has named Christine Peterson, President at Protus3, a 2020 C-Suite Award winner. These awards honor outstanding C-level executives for their contributions to the Triangle community. The 2020 class of C-Suite Awards winners includes individuals from a variety of industries such as technology, life sciences, finance and commercial real estate. They also hold such titles as chief …
Coronavirus Response
Consistent with Protus3’s commitment to help our clients plan and protect in order to prosper, we are monitoring the situation caused by the Coronavirus Disease 2019 (COVID-19). On March 11, the World Health Organization (WHO) elevated the outbreak classification to an official pandemic. Protus3 continues to evaluate our operations and continuity plans in order to provide for the ongoing health …
Effective Security Requires Thoughtful Decisions
In her Editor’s Note published in the January/February 2020 Campus Safety magazine, Robin Hattersley reminds us all of the power of seeking professional advice when lives are at stake. Would you go to a pharmaceutical company to advise you about health concerns that you have? Would you invest in health equipment based on a good sales pitch? Why should effective …
Phishing Scams and SMShishing Scams
In today’s technology-based world, phishing email scams have become commonplace. Whether simple or complex these scams are often effective. Both companies and individuals fall victim to phishing scams leading to the loss of billions of dollars annually. Phishing scams typically involves a cybercriminal impersonating a legitimate company or individual. They attempt to gain access to personal or private information such …