In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …
3 Traits of a Successful Clery Compliance Coordinator
Campus Safety Magazine published “3 Traits of a Successful Clery Compliance Coordinator”, an article that highlights some of the challenges and nuances facing institutions and Clery Coordinators trying to comply with its requirements. It also drives home that elevating compliance from a departmental/individual response to a coordinated institutional response will drive success. In the business world, this seems like such …
The Security Strategy That Works for Two College Campuses
Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …
Prevention or Mitigation: Which Do You prefer?
How important is a security program? The first role of any organization’s leadership is the protection of the organization. In higher education, reputation is an institution’s greatest asset. Reputation attracts the talent – students, faculty/staff, business collaboration, and academic and non-academic recruitment. Reputation also attracts the resources – research, innovation, donors/investors, and funding. As security consultants, we have seen organizations …
Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case
It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …
How to Build a Culture of Security
How can companies build a culture of security? We say it all the time, but it’s nice to hear it from a colleague for a change. “Security is everyone’s business” is popular truism in the industry. However, how many security managers can honestly say that their companies practice this philosophy? Read more in How to Build a Culture of Security …
3 Mistakes That Can Derail Your Threat Assessment Process
Campus Safety Magazine published 3 Mistakes That Can Derail Your Threat Assessment Process. Although this article addresses students in an educational environment, it includes lessons for employers as well. How can security professionals protect the individual as well as the whole community? Violence in the workplace is more common than many believe – and it is also often predictable and …
Companies Can be Liable for Failing to Maintain Adequate Cyber Security
How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …
FBI Workplace Violence Prevention: Readiness and Response
In January 2011, the FBI published Workplace Violence Prevention: Readiness and Response. This is a fairly lengthy and detailed article that is definitely worth the read. We found this information especially interesting: A handful of high-profile incidents have led to increased public awareness. However, prevalence rates show that nonfatal workplace violence is a more common phenomenon than previously believed. …
Keeping the Campus Safe during a Title IX Investigation
Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations Plan. Protect. Prosper. Protus3 specializes in security system design, …










