Many companies or organizations assume that the addition of technology can be the single solution to a security concern. Companies and organizations depend upon these technologies only to find out later, and after considerable expense, that the technology may not be all it was presented to be. It is always important to remember that the technology is only as good …
Chinese Hackers Breached Nortel for Years
Why is your company in business? You’re probably thinking, “That is obvious. We provide a superior product or service that our customers need.” This leads to three key questions: Do you know what your economic advantage looks like? Are you protecting your economic advantage adequately? How early can you identify leaks and do you have a plan to stop the …
Online Impersonation
Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …
State of the State: North Carolina Intelligence Community
Think of security as a three-legged stool. If you remove any of the legs the stool will not stand. The legs of the security stool are a motivated opportunist, access to an asset, and the perception by the opportunist that they have a “good” chance of being successful in gaining the asset. As a security consulting firm, Risk Management Associates, …
Recorded Video – There When You Need It
Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …
State Department Launches Counter-Terror Bureau For Threats Abroad
If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. We know you are in risk overload, but the fact that the federal government has created a Bureau of Counterterrorism beginning January 4, 2012, tells you that the threat is so great that …
Inaccuracies in Background Checks
AP IMPACT: When your criminal past isn’t yours Out of work two years, her unemployment benefits exhausted, in danger of losing her apartment, Casey applied for a job in the pharmacy of a Boston drugstore. She was offered $11 an hour. All she had to do was pass a background check. It turned up a 14-count criminal indictment. Kathleen Casey …
Penn State: Clery Act Implications
Earlier this month, the U.S. Department of Education (DOE) announced that it would launch its own investigation into the now infamous Penn State football scandal. This investigation will focus on whether the university failed to comply with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (the Clery Act) – the federal law which, among other …
Loose Lips Sink Ships
The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …
Travel Plans
Maybe it’s just us, but we’re thinking 2011 will be remembered as the year of the disaster plan. We have seen tsunamis, fires, earth quakes, volcanic eruptions, tornadoes, hurricanes, dust storms, and the snow and ice of last winter. The good news is that we have seen a new or at least renewed awareness in the businesses we support and …







