fire exit

Be Aware

Amanda StricklandNews, Workplace Violence

Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …

text message conversation

What is Sextortion?

Amanda StricklandNews

Sextortion refers to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion (Source: Wikipedia). In recent months, we have been hired to assist clients who have made the mistake of hitting the send button and wishing there was some way to “get that photo back.” These cases normally involve men …

new model of leakage

Employment Law: Can You Police Social Media?

Amanda StricklandCompliance

Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …

front page news

Front Page News for All the Wrong Reasons

Amanda StricklandBackground Investigation, Security Program Development, Workplace Violence

Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …

people texting

Legal Requirements as Mobile Devices Inundate Offices

Amanda StricklandCompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Intellectual Property, Security Program Development

By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …

BP texting

Government Files First Criminal Charges In BP Oil Spill

Amanda StricklandCompliance, Computer Forensics

As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …

emergency-call-box

Maintaining Security Management Systems

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

It is not a secret that most departments within corporations and governments including local, state, and federal have been asked to reduce their budgets by a certain percentage every year since the economy took a turn for the worse. This has been a challenge – especially for security departments. How do you maintain the level of security needed today with …