Predators could be spying on you through your computer’s webcam. Criminals are now able to hack in and watch your every move – without you ever knowing it. Scary, right? We’re all guilty of it: we use our computer, get distracted with something, and just walk away. We forget the computer is still on – and this is the key …
Probability and Criticality
When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …
Matching Records – No Full Names Please
We have a client (let’s call them Sub) who is obtaining criminal history information as part of their compliance to another company (let’s call them Prime). Prime states that Sub should “Provide a criminal record check with the applicant’s full legal name.” Sub contracted with RMA to provide that information. When we search, we don’t limit our results to the …
Lock Your Computer
The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …
Armed Versus Unarmed Security Officers
The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. In this context, the term “armed” is intended to mean “equipped with firearms and …
The Dark Parking Lot
I went to a local big box store and pulled into the parking lot at about 6:30pm – not too late in the evening but after dark in the winter. As I was parking I received a phone call, so I sat in my car to complete the call. While on the phone it occurred to me how dark the …
Hotel Locks
Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …
Check Their References
I was working on a background investigation for a client recently, and I was reminded of a valuable lesson. (By the way, names and identifying information have been edited in this story, but the circumstances and situations have not.) When we verify employment, normally companies only provide dates of employment and position held. Sometimes companies will tell you whether the …
System Commissioning and Integrated Security Systems
As integrated security systems become more prevalent within the corporate, healthcare and government industries, security directors and mangers rely more heavily on their security integrator to verify that all systems work together properly, seamlessly, and as designed. Once an installation has been completed by the integration company, it is recommended that a third-party commission the entire system. This step is …
Be Aware
Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …










