The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a security issues they faced such as internal theft, threat to executives, employee malfeasance, compliance issues, or other security problems. These issues turned into the need for an …
Rusty Gilmore Interviewed by WRAL
An investigation that began in Wake County of nude photos of high school students on Instagram has expanded to at six more North Carolina counties, bringing the total to at least nine, a spokeswoman for the state Department of Justice said Wednesday. School system representatives have said they are cooperating with authorities in the investigation, and authorities are urging parents …
WRAL: Security Measures Not Foolproof, Consultant Says
Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584
NC companies’ Secrets at Risk, Cyber Terrorism Experts Say
In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …
Installation and Neatness, It Does Matter
I have been in this business for over 30 years, and I am still surprised sometimes at what we find when we are asked to perform an assessment of a security system. The picture is a great example of what not to do, however there are companies out there that continue to install systems this way. I am not exactly …
Identity Theft – Where’s Your Wallet?
Identity theft is talked about constantly, and when it happens to someone, their response is normally “I don’t know how this happened to me”. Sometimes it is just too easy. On a recent business trip – to a security conference no less – as we walked into a restaurant for breakfast we passed an empty booth with no one close …
Security Threat Assessments for Education
In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …
Lock Your Computer
The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …
The Dark Parking Lot
I went to a local big box store and pulled into the parking lot at about 6:30pm – not too late in the evening but after dark in the winter. As I was parking I received a phone call, so I sat in my car to complete the call. While on the phone it occurred to me how dark the …
System Commissioning and Integrated Security Systems
As integrated security systems become more prevalent within the corporate, healthcare and government industries, security directors and mangers rely more heavily on their security integrator to verify that all systems work together properly, seamlessly, and as designed. Once an installation has been completed by the integration company, it is recommended that a third-party commission the entire system. This step is …









