technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha Dyson, CFECompliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

GDPR and EU Flag

What is GDPR and does it affect me?

Jerry T. Blanchard, Jr., CPPCompliance, News, Security System Lifespan Management

GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …

Christine Peterson

FBI Insider Threat for Small Business Program

Amanda StricklandNews

On May 31, 2018, the FBI held an Insider Threat for Small Business program at their Charlotte, NC, office. Attendance was by invitation only. Christine Peterson attended on behalf of the partnerships that Protus3 builds with clients to protect their assets. As a big fan of the concept “Together is Better” Protus3 believes that it takes a community working together …

security checkup

Security Program Check-up Should Be Held Annually

Amanda StricklandSecurity Master Planning, Security Program Development

When was the last time that your security program had a check-up? We all know that we should visit our physician for an annual check-up or physical. This is the time to discuss with your doctor any issues or symptoms you may be having. Your doctor will examine you to make sure everything checks out ok. The same should hold …

law enforcement

When Not to Call the Police

Chuck HurstBackground Investigation, Theft, Embezzlement, and Fraud

I used to be a cop. Served proudly, retired and kicked back, all set to enjoy my pension. Any cop who tells you they have seen it all and done it all would be prone to exaggeration, to put it politely. During my career, I shared a multitude of experiences —- from outright hilarious to downright heartbreaking. While I was …

worried woman

Sexual Harassment: Organizational Integrity and Perception

Chuck HurstCompliance, News

During the course of one’s life, it is said that your reputation precedes you in every facet of your life. It goes in the door before you ever set foot in a courtroom, boardroom, operating room, classroom, or boiler room. It doesn’t matter if you are white collar or blue collar; a person’s reputation matters. Does the same hold true …

article from The Hacker News

Keyboard App Leaks Mobile Data

Amanda StricklandComputer Forensics, Mobile Forensics, News

Sometimes mobile apps do more than we think they do. Researchers at the Kromtech Security Center discovered personal data being collected by a smartphone virtual keyboard app on its 31 million users, as reported by The Hacker News. The leaked information included: Full name, phone number, and email address Device name, screen resolution, and model details Android version, IMSI number, …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Amanda StricklandCrisis Management Planning, Security Master Planning, Security Program Development

Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …