You’ve Conducted a Background Check… Now What?

Amanda StricklandBackground Investigation

Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …

lock take hide signs

What is Your Security Culture?

Tasha Dyson, CFESecurity Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

SSI access control article

Addressing Access Control

Jerry T. Blanchard, Jr., CPPNews, Workplace Violence

Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …

trained response and untrained response graphic

Training to Respond to Workplace Violence

Christine L. Peterson, CPP, ISPTraining, Workplace Violence

Last month I wrote about the importance of training as a security tool to support best outcomes in a security event. That post specifically addressed workplace violence and active shooters. Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect us is important for our wellbeing and best outcomes. …

evaluation factors

Reflections on Virginia Beach

Amanda StricklandNews, Security Assessment, Training, Workplace Violence

Friday was a very sad day for the city of Virginia Beach as well as our country. Yet another senseless and tragic mass shooting has taken place and has left us with many questions. Why did this happen? How did this happen? Finally, what could have been done to prevent this from happening? Hearts are broken and loved ones have …

Workplace Violence Gets Personal

Christine L. Peterson, CPP, ISPTraining, Workplace Violence

Last night I had the opportunity to address the Raleigh Financial Executive Networking Group (FENG) and lead a presentation on Managing Aggressive Behavior & Workplace Violence (workplace violence). This particular opportunity to train industry leaders was especially meaningful to me as I was giving thanks for the safety of one of my nieces. She attends STEM School Highlands Ranch where …

dragon

Nationwide Criminal Search: A Persistent Myth

Tasha Dyson, CFEBackground Investigation

Dragons. Mermaids. Fairies. The Loch Ness Monster. Bigfoot. Leprechauns. Nationwide criminal searches. All are mythical creatures. We’re asked all the time if we offer a “nationwide criminal search” or a “multi-state criminal search”. The answer is always “No.” Why not? Because it simply doesn’t exist. When you talk about a “nationwide criminal search” or a “multi-state criminal search”, what do …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, Security Program Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …