Campus Safety article about guns on campus

CCP Holders and Guns on Campus

Christine L. Peterson, CPP, ISPCrisis Management Planning, News, Security Program Development, Training, Workplace Violence

Should CCP holders be allowed to carry guns on campus? There are studies that show during times of great stress, a person will experience changes that affect their physiological, sensory and cognitive processes which can prevent appropriate responses in very serious situation. These responses can affect critical decision-making processes. For example, check out the eleven reservations of a “gun guy.” …

phone keypad

Are VoIP Phones Secure?

Russell W. Gilmore, CISSP, CISM, EnCENews

A recent article identified and discussed a security flaw in VoIP phones. I am not advocating throwing away your VoIP phone system and going back to analog; I recommend educating yourself to the possible threat, measuring the likelihood of that threat in your environment, and making corrective measures if necessary. Most of the electronic devices we use on a daily …

digital forensics expert

Computer Forensics Provides Digital Evidence

Amanda StricklandComputer Forensics, News

Digital evidence provided by computer forensics can yield amazing results: find deleted materials, recover lost documents, establish a timeline of events, expose intentions, uncover crimes, and others. The breadth and depth of the field will only continue to grow as electronic devices proliferate into every aspect of life. As the demand for forensic experts, tools, and resources has increased, the …

sign that says rethink

Clery: Rethinking Your Role

Amanda StricklandCompliance, News

Reputation equals funding: For many years researchers have investigated the influence of reputation on a university’s ability to raise capital. The general consensus is that even while reputation remains mercurial, its effect is hard to overstate. The better the reputation, the better the funding. As a result, many universities have begun to divert more resources towards what some scholars are …

down the rabbit hole

Lighting at the End of the Rabbit Hole: How to Determine Appropriate Lighting Levels as Part of a Total Security Program

Dana Frentz, CHPA, PSPSecurity Assessment, Security Program Development

Beginning Down the Rabbit Hole We all know the use of lighting alone does not stop crime, but the effects of good lighting coupled with additional security measures have been shown to reduce the occurrence of crime. Lighting can elicit an emotional response, providing a level of confidence and the feeling of security. It can also provide a decrease in …

IAHSS publication

Body Worn Camera Use in Health Care Facilities

Dana Frentz, CHPA, PSPCompliance, News, Security Program Development

>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …

dark web

What Is the Dark Web?

Amanda StricklandComputer Forensics

I am not a computer techie, just an average computer, smart phone, and iPad user. I use the Internet for email, word searches, research, and of course the occasional shopping experience. Have you ever wondered: what is the Dark Web? I must admit I am a bit curious. Could it be that bad to just Google the words “Dark Web” …

empty classroom

Reflections on Oregon Shooting

Christine L. Peterson, CPP, ISPSecurity Program Development, Workplace Violence

The shooting at Umpqua Community College on October 1, 2015, made us think. Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting to commit harm. What we can do is harden ourselves as targets. This will …

data center

Physical Security for Data Centers

Emily SchackSecurity Assessment, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Testing and Commissioning

It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …