GRCC Annual Meeting 2018

Protus3 Attends Raleigh Chamber Annual Meeting

Protus3 News

Protus3 was a proud sponsor of the Greater Raleigh Chamber of Commerce’s 130th Annual Meeting on September 21, 2018.  The Raleigh Chamber is a key leader, collaborator, and connector in our region. Their ability to innovate and learn from the mistakes in other communities plays a critical role in our regions recognition as a wonderful place to live, work, and do …

Campus Safety Article

Campus Security: Parents So Concerned They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISP News, Security Program Development, Workplace Violence

Campus security and safety of students, faculty, staff and infrastructure should be a foregone conclusion. Unfortunately, it is not. Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. Active Shooter Events Time and again we are horrified by active shooter events targeting …

surveillance

Video Management Optimization with IP Cameras and Video Settings

Kevin M. McQuade, CPP Security System Lifespan Management, Security System Testing and Commissioning

The Problem Recently, one of our clients with a very large video management system (VMS) noticed they were not getting a full 30 days of online video storage from a particular security camera video server that had recently been installed. This client has multiple servers spread throughout multiple facilities. The majority of the other servers were performing well and were …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI is tasked with investigating many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I can say with experience that the FBI has increased the process of alerting and educating the public about certain security and safety issues. This is most evident as it …

US-CERT

Back-to-School Cyber Safety

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Security Program Development

It is that time of year again for many parents to think about cyber safety for their children. We are sending our children back to school. They have their phones, tablets and computers and are ready to start a new year. This is the perfect time to think about their cyber safety. One such safety category is keeping your children …

time

Why Do Background Investigations Take So Long?

Tasha D. Dyson Background Investigation

Time is the number one challenge for employers in the background investigation process. That was one finding in the study entitled “How Human Resource Professionals View the Use and Effectiveness of Background Screening Methods” published by NAPBS and HR.com in June 2018. You can read the entire report here. What wasn’t reported was the expectation about how long a background …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomeware. This allows attackers to hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from the …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data, the employee. A recent study finds that nearly two in five …