Raleigh, N.C. — Raleigh police are combing through evidence, including 911 calls and security tapes, from Crabtree Valley Mall in an effort to determine what happened Saturday afternoon in the food court. The sound of gunfire inside sparked panic and sent everyone running out of the mall with their hands up. “I would rather see people run than not run,” …
After Orlando
It will be days, weeks, and years before we know all the details that lead up to and enabled a young man in Florida to commit the deadliest US mass shooting to date at Pulse nightclub. As a security consulting, design, and investigative company, we will let the media, government, and activists do what they do best and we will …
How to Build a Culture of Security
How can companies build a culture of security? We say it all the time, but it’s nice to hear it from a colleague for a change. “Security is everyone’s business” is popular truism in the industry. However, how many security managers can honestly say that their companies practice this philosophy? Read more in How to Build a Culture of Security …
New Release of the 2016 Healthcare Crime Survey Report
The IAHSS Foundation just released the 2016 Healthcare Crime Survey Report. This report uses the FBI’s Uniform Crime Report definitions (U.S.) and the Criminal Code Definitions (Canada) to ensure consistency for events reported. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) was established to foster and promote the welfare of the public through educational and research …
Companies Can be Liable for Failing to Maintain Adequate Cyber Security
How much customer data do you have? Is it secure? If so, you should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate …
What is the Right RFP?
Ensure you get what you ask for! An RFP provides a great opportunity to specify exactly what you want in equipment or a service. Campus Safety’s article “How the Right RFP Can Ensure the Program You Buy Is the Program You Get” provides engaging aspects for developing and issuing RFPs. Many companies contract for security officers through a third-party company. …
CCP Holders and Guns on Campus
Should CCP holders be allowed to carry guns on campus? There are studies that show during times of great stress, a person will experience changes that affect their physiological, sensory and cognitive processes which can prevent appropriate responses in very serious situation. These responses can affect critical decision-making processes. For example, check out the eleven reservations of a “gun guy.” …
Are VoIP Phones Secure?
A recent article identified and discussed a security flaw in VoIP phones. I am not advocating throwing away your VoIP phone system and going back to analog; I recommend educating yourself to the possible threat, measuring the likelihood of that threat in your environment, and making corrective measures if necessary. Most of the electronic devices we use on a daily …
Computer Forensics Provides Digital Evidence
Digital evidence provided by computer forensics can yield amazing results: find deleted materials, recover lost documents, establish a timeline of events, expose intentions, uncover crimes, and others. The breadth and depth of the field will only continue to grow as electronic devices proliferate into every aspect of life. As the demand for forensic experts, tools, and resources has increased, the …
Clery: Rethinking Your Role
Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …










