Campus Safety Article

Campus Security: Parents So Concerned They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISPNews, Security Program Development, Workplace Violence

Campus security and safety of students, faculty, staff and infrastructure should be a foregone conclusion. Unfortunately, it is not. Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. Active Shooter Events Time and again we are horrified by active shooter events targeting …

surveillance

Video Management Optimization with IP Cameras and Video Settings

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

The Problem Recently, one of our clients with a very large video management system (VMS) noticed they were not getting a full 30 days of online video storage from a particular security camera video server that they recently installed. This client has multiple servers spread throughout multiple facilities. The majority of the other servers were performing well and were obtaining …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFECompliance, Security Program Development, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …

time

Why Do Background Investigations Take So Long?

Tasha Dyson, CFEBackground Investigation

Time is the number one challenge for employers in the background investigations process. That was one finding in the study entitled “How Human Resource Professionals View the Use and Effectiveness of Background Screening Methods” published by NAPBS and HR.com in June 2018. You can read the entire report here. The report did not include the expectation about how long background …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics, News, Theft, Embezzlement, and Fraud, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

TBJ article

Millions Evaporate as Trade Secrets Lawsuits Fly Across NC, US

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Theft, Embezzlement, and Fraud

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …

PBS News Hour Article

Security Clearance Checks for Federal Government to be Handled by Federal Government

Christine L. Peterson, CPP, ISPBackground Investigation, News

At the moment, this only applies to background investigations involving military and civilian employees and contractors for Defense Department. These security clearance checks represent the largest portion of OPM’s current workload and backlog. As a security company that provides background screening services, we are watching this in the hopes that it will support better automation, accuracy, and resources for all …