bring your own device

Five Keys to Mobile Phone Security

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …

security camera split view

Recorded Video – There When You Need It

Amanda StricklandSecurity System Design Development

Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …

daniel-benjamin

State Department Launches Counter-Terror Bureau For Threats Abroad

Amanda StricklandSecurity Program Development

If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. We know you are in risk overload, but the fact that the federal government has created a Bureau of Counterterrorism beginning January 4, 2012, tells you that the threat is so great that …

dont-click

Don’t Click that Link!

Christine L. Peterson, CPP, ISPSecurity Program Development, Training

NCMS (National Classification Management Society) is a society that provides training and guidance to private sector firms who are industrial contractors to the federal government on classified contracts. As a member of the national organization and the Carolinas Chapter, RMA has access to some excellent and timely training. “Don’t Click That Link!” came from another member and is a good …

Question Mark Key on Computer Keyboard

Inaccuracies in Background Checks

Amanda StricklandBackground Investigation

AP IMPACT: When your criminal past isn’t yours Out of work two years, her unemployment benefits exhausted, in danger of losing her apartment, Casey applied for a job in the pharmacy of a Boston drugstore. She was offered $11 an hour. All she had to do was pass a background check. It turned up a 14-count criminal indictment. Kathleen Casey …

Painful Lessons from Leland

Christine L. Peterson, CPP, ISPBackground Investigation

SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …

FBI says hackers hit key services in three US cities

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews

Everybody is preoccupied with chemical, biological, radiological, and nuclear devices (CBRNE) and vehicle-borne improvised explosive devices (VBIED) while the hackers are practicing to really take us down hard. In our opinion, this is the new “front line” in security and counterterrorism. How do we get the great unwashed to understand that passwords are not just there as a nuisance? Gives …

smartphones

‘Dirty Dozen’ Unsecured Smartphones

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews, Security Program Development

On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …

gavel law books

Penn State: Clery Act Implications

Amanda StricklandCompliance

Earlier this month, the U.S. Department of Education (DOE) announced that it would launch its own investigation into the now infamous Penn State football scandal. This investigation will focus on whether the university failed to comply with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (the Clery Act) – the federal law which, among other …