Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …
Items of Value in Cars – Asking for Trouble
What concerns me is how individuals will leave GPS, phones, iPods, purses, money, and other items of value in their cars – in plain view. They may say, “well, I don’t have anything in my purse” or “my GPS is old.” Someone just walking by your car does not know that the purse may be empty or the GPS may …
What is Sextortion?
Sextortion refers to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion (Source: Wikipedia). In recent months, we have been hired to assist clients who have made the mistake of hitting the send button and wishing there was some way to “get that photo back.” These cases normally involve men …
Access Card – Keys to the Building
As most of us know, an access card or credential is a key to gain entry to a parking lot, building, or other secured space. Why then do so many people leave their card in their car after work? Some even hang them from their mirror. When I ask, the response I usually get is “it is more convenient and …
Employment Law: Can You Police Social Media?
Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …
Who is Monitoring You?
The last few years have brought about remarkable technologies in the way we communicate with one another. There are the old standbys – voice mail, email, and texting – but now people are using Twitter, Facebook, and Youtube just to name a few. These are all wonderful tools to communicate with others, but how secure are they? Nothing upsets me …
Front Page News for All the Wrong Reasons
Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …
Legal Requirements as Mobile Devices Inundate Offices
By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …
Government Files First Criminal Charges In BP Oil Spill
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …
Maintaining Security Management Systems
It is not a secret that most departments within corporations and governments including local, state, and federal have been asked to reduce their budgets by a certain percentage every year since the economy took a turn for the worse. This has been a challenge – especially for security departments. How do you maintain the level of security needed today with …










