dictionary shown through glasses

Massachusetts Drug Lab Scandal

Christine L. Peterson, CPP, ISPBackground Investigation, Compliance, News, Theft, Embezzlement, and Fraud

On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …

callerID

Fake Caller ID Attacks on The Rise

Tasha Dyson, CFENews, Theft, Embezzlement, and Fraud

These kinds of phony calls have existed for years, but the sophistication has increased to combat our increased vigilance. Use the same cautions that you would use when opening an email that appears to be from your bank or other institution. When you receive a call or email from your bank, the safest course of action is to initiate the …

Jury Says Virginia Tech Negligent

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews

Emergency plans are for doing – not just for having. This recent verdict underlines an important discrepancy between the letter and intent of both the Clery requirements for campus warnings and emergency warning best practices and the way these procedures are implemented in reality in some crisis situations. No matter how comprehensive and well founded an emergency plan is or …

cargo plane

FedEx Settles Charges of Causing, Aiding and Abetting Unlicensed Exports

Christine L. Peterson, CPP, ISPCompliance, News

In 2010, Michael R. Epperly, Esq. who heads RMA’s Corporate Compliance consulting arm, wrote an insightful article that addressed the corporate compliance challenges that American companies face in the global marketplace. Through his experience as legal counsel, investigator, and consultant he is acutely aware of the importance of a solid corporate compliance program to an organization and the penalties that …

Chained computer

Clear Your Google Web History

Russell W. Gilmore, CISSP, CISM, EnCENews

On March 1, 2012, Google will implement a new privacy policy. This new policy will affect any data Google has collected on you prior to that date, along with data collected from then on. Under the new policy, your Google Web History can be combined with other data Google has gathered about you from other services like Gmail, Google+, and …

border security

Eye Scanners at England Airports Turned Off

Amanda StricklandNews

Many companies or organizations assume that the addition of technology can be the single solution to a security concern. Companies and organizations depend upon these technologies only to find out later, and after considerable expense, that the technology may not be all it was presented to be. It is always important to remember that the technology is only as good …

chinese flag and numbers

Chinese Hackers Breached Nortel for Years

Amanda StricklandNews

Why is your company in business? You’re probably thinking, “That is obvious. We provide a superior product or service that our customers need.” This leads to three key questions: Do you know what your economic advantage looks like? Are you protecting your economic advantage adequately? How early can you identify leaks and do you have a plan to stop the …

Iran Reports Killing of Nuclear Scientist in ‘Terrorist’ Blast

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews

Move over Bering Sea crab fishermen. There is a new “Most Dangerous Job in the World” – scientist in the Iranian nuclear weapons program. The assassination in January was the fourth in two years. This is another successful use of a motorcycle team to attach a small but effective explosive device to a car trapped in traffic with immediate initiation. …

woman holding a dog in the screen

Online Impersonation

Amanda StricklandNews, Theft, Embezzlement, and Fraud

Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …

Fine Tune Your Criminal Background Checks

Christine L. Peterson, CPP, ISPBackground Investigation, News

Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …