Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …
State of the State: North Carolina Intelligence Community
Think of security as a three-legged stool. If you remove any of the legs the stool will not stand. The legs of the security stool are a motivated opportunist, access to an asset, and the perception by the opportunist that they have a “good” chance of being successful in gaining the asset. As a security consulting firm, Risk Management Associates, …
Recorded Video – There When You Need It
Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …
State Department Launches Counter-Terror Bureau For Threats Abroad
If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. We know you are in risk overload, but the fact that the federal government has created a Bureau of Counterterrorism beginning January 4, 2012, tells you that the threat is so great that …
Don’t Click that Link!
NCMS (National Classification Management Society) is a society that provides training and guidance to private sector firms who are industrial contractors to the federal government on classified contracts. As a member of the national organization and the Carolinas Chapter, RMA has access to some excellent and timely training. “Don’t Click That Link!” came from another member and is a good …
Inaccuracies in Background Checks
AP IMPACT: When your criminal past isn’t yours Out of work two years, her unemployment benefits exhausted, in danger of losing her apartment, Casey applied for a job in the pharmacy of a Boston drugstore. She was offered $11 an hour. All she had to do was pass a background check. It turned up a 14-count criminal indictment. Kathleen Casey …
Painful Lessons from Leland
SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …
FBI says hackers hit key services in three US cities
Everybody is preoccupied with chemical, biological, radiological, and nuclear devices (CBRNE) and vehicle-borne improvised explosive devices (VBIED) while the hackers are practicing to really take us down hard. In our opinion, this is the new “front line” in security and counterterrorism. How do we get the great unwashed to understand that passwords are not just there as a nuisance? Gives …
‘Dirty Dozen’ Unsecured Smartphones
On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …
Penn State: Clery Act Implications
Earlier this month, the U.S. Department of Education (DOE) announced that it would launch its own investigation into the now infamous Penn State football scandal. This investigation will focus on whether the university failed to comply with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (the Clery Act) – the federal law which, among other …







