time

The “Fractional” Security Manager

Amanda StricklandSecurity Assessment, Security Master Planning, Security Program Development

The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a security issues they faced such as internal theft, threat to executives, employee malfeasance, compliance issues, or other security problems. These issues turned into the need for an …

Rusty Gilmore

Rusty Gilmore Interviewed by WRAL

Amanda StricklandComputer Forensics, News

An investigation that began in Wake County of nude photos of high school students on Instagram has expanded to at six more North Carolina counties, bringing the total to at least nine, a spokeswoman for the state Department of Justice said Wednesday. School system representatives have said they are cooperating with authorities in the investigation, and authorities are urging parents …

WRAL: Security Measures Not Foolproof, Consultant Says

Amanda StricklandBackground Investigation, Crisis Management Planning, News, Security Program Development, Workplace Violence

 Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Amanda StricklandComputer Forensics, Electronic Data Recovery, News, Theft, Embezzlement, and Fraud

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

wires entanlged and disorganized in box

Installation and Neatness, It Does Matter

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

I have been in this business for over 30 years, and I am still surprised sometimes at what we find when we are asked to perform an assessment of a security system. The picture is a great example of what not to do, however there are companies out there that continue to install systems this way. I am not exactly …

woman taking money out of her wallet

Identity Theft – Where’s Your Wallet?

Amanda StricklandNews

Identity theft is talked about constantly, and when it happens to someone, their response is normally “I don’t know how this happened to me”. Sometimes it is just too easy. On a recent business trip – to a security conference no less – as we walked into a restaurant for breakfast we passed an empty booth with no one close …

college students

Security Threat Assessments for Education

Amanda StricklandSecurity Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …

Chained computer

Lock Your Computer

Amanda StricklandTraining

The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …

installation problems

System Commissioning and Integrated Security Systems

Amanda StricklandSecurity Program Development, Security System Testing and Commissioning

As integrated security systems become more prevalent within the corporate, healthcare and government industries, security directors and mangers rely more heavily on their security integrator to verify that all systems work together properly, seamlessly, and as designed. Once an installation has been completed by the integration company, it is recommended that a third-party commission the entire system. This step is …