circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISPSecurity Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

campus safety article

3 Traits of a Successful Clery Compliance Coordinator

Christine L. Peterson, CPP, ISPCompliance

Campus Safety Magazine published “3 Traits of a Successful Clery Compliance Coordinator”, an article that highlights some of the challenges and nuances facing institutions and Clery Coordinators trying to comply with its requirements. It also drives home that elevating compliance from a departmental/individual response to a coordinated institutional response will drive success. In the business world, this seems like such …

campus safety article

The Security Strategy That Works for Two College Campuses

Christine L. Peterson, CPP, ISPSecurity Master Planning, Security Program Development, Security System Design Development

Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …

plan, protect, prosper

Prevention or Mitigation: Which Do You prefer?

Christine L. Peterson, CPP, ISPCompliance, News

How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …

Campus Safety article about Penn State fine

Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case

Christine L. Peterson, CPP, ISPCompliance, News

It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …

How to Build a Culture of Security article

How to Build a Culture of Security

Christine L. Peterson, CPP, ISPNews, Security Program Development

How can companies build a culture of security? We say it all the time, but it’s nice to hear it from a colleague for a change. “Security is everyone’s business” is popular truism in the industry. However, how many security managers can honestly say that their companies practice this philosophy? Read more in How to Build a Culture of Security …

Campus Safety threat assessment article

3 Mistakes That Can Derail Your Threat Assessment Process

Christine L. Peterson, CPP, ISPSecurity Program Development, Workplace Violence

Campus Safety Magazine published 3 Mistakes That Can Derail Your Threat Assessment Process. Although this article addresses students in an educational environment, it includes lessons for employers as well. How can security professionals protect the individual as well as the whole community? Violence in the workplace is more common than many believe – and it is also often predictable and …

High Stakes Cyber article

Companies Can be Liable for Failing to Maintain Adequate Cyber Security

Christine L. Peterson, CPP, ISPCompliance, Intellectual Property, News, Security Program Development

How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …

response to workplace violence

FBI Workplace Violence Prevention: Readiness and Response

Christine L. Peterson, CPP, ISPWorkplace Violence

In January 2011, the FBI published Workplace Violence Prevention: Readiness and Response. This is a fairly lengthy and detailed article that is definitely worth the read. We found this information especially interesting: A handful of high-profile incidents have led to increased public awareness. However, prevalence rates show that nonfatal workplace violence is a more common phenomenon than previously believed.   …

Campus Safety article on safety during investigations

Keeping the Campus Safe during a Title IX Investigation

Christine L. Peterson, CPP, ISPCompliance, Training, Workplace Violence

Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations     Plan. Protect. Prosper. Protus3 specializes in security system design, …