Security Training

SECURITY TRAINING Security training and awareness are probably the most efficient, cost-effective tools available to an organization. Ultimately, people cause security problems – often deliberately and sometimes unintentionally. Studies show that the best way to improve an organization’s security is not by creating a technical solution; instead organizations need to spend more time training and educating their employees – the …

Security Officer Services

SECURITY OFFICER SERVICES Protus3 offers security officer service RFP design, audits, and training. We help organizations put in place quality security officer providers, investigate their effectiveness, and manage and improve current officers. Contract Security Services We are often asked to help write specifications that clearly explain the responsibilities of security providers so that our client can get the best service …

COMPUTER FORENSICS

COMPUTER FORENSICS You give us data, we give you answers.We are computer forensics experts who find solutions to your corporate, business, and private needs. If you are in the process of discovery, we can help. Our team has a vast array of knowledge in both Windows and iOS; as well as tablets, smart phones, servers, and Cloud-based accounts. With state …

Investigative Services

INVESTIGATIVE SERVICES Scalable Threat Impact Security risks occur when people take deliberate actions to harm or damage your organization. Any organization that has assets – intellectual or physical, including reputation, people, and brand – has a security problem. Security breaches are an inherent part of doing business. The corporate investigative services process looks to determine what happened, the extent of …

Services

Integrated Protection BUSINESS SECURITY SYSTEM DESIGN Protus3 has extensive experience creating well-designed security systems. We take into account your organization’s culture, operations, assets, philosophies and expected outcomes. Protus3 will partner with you to create a seamless and effective security program tailored to your organization.Customized Security Solutions BUSINESS SECURITY CONSULTINGProtus3 takes a proactive, customized approach to assessing your organization’s security threats. …

security system design

About Protus3

Protus3 strives to be an approachable, perceptive and responsive team that advocates for our clients and performs with flawless execution. At Protus3, we’re here to help clients secure a path forward. Through the development of custom controls and security system design, we help protect our clients’ assets and competitive advantage – providing the stability that allows them to prosper with …

Home

Technology is a tool, not a solution. Protus3 security system design Assessing needs and finding solutions. Protus3 security consulting Reduce the threat. Reduce the impact. Protus3 Investigative services Security Design & Corporate investigations Protus3 helps clients plan, protect and prosper by specializing in business security system design, business security consulting, corporate investigations and other investigative services. Protus3 partners with clients …

Policy and Procedure Flow Chart

A Company Model for Developing Policies and Procedures

Christine L. Peterson, CPP, ISPCompliance, Security Program Development

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley data security breach scares me as an employee. Reportedly, Morgan Stanley terminated Galen Marsh, a financial adviser, for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. Federal law enforcement officials are focusing their probe on the possibility that Marsh’s computer …