Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …
Technical Assessments – Installation and Maintenance Issues
This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …
Stolen Login Credentials on the Dark Web
Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …
Digital Forensics
CONTACT US(800) 775-8584Contact Us for a Free Digital ForensicsCase EvaluationHOW CAN WE HELP? Computer Forensics Form Please tell us a little bit about your data environment so that we can get the appropriate resources engaged in the conversation. * We collect, use and process your data according to our Privacy Policy. * I agree If you are human, leave this …
You’ve Conducted a Background Check… Now What?
Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …
Preventing Workplace Violence When Terminating An Employee
Firing or laying someone off is one of the most stressful situations for a company. Typically, no one in management or human resources wants to be the bearer of bad news to an employee. But of course the stress goes both ways, because it’s also usually a very stressful time for the employee. At the moment someone hears, “We have …
What is Your Security Culture?
These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …
Addressing Access Control
Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …
Training to Respond to Workplace Violence
Last month I wrote about the importance of training as a security tool to support best outcomes in a security event. That post specifically addressed workplace violence and active shooters. Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect us is important for our wellbeing and best outcomes. …
COMPUTER FORENSICS
MOBILE FORENSICS Follow the data, especially when it goes mobile Mobile devices such as cell phones, tablets, watches, GPS devices, and more are growing increasingly popular. With the growth in the use of mobile devices, so increases the likelihood that these devices may become caught up in either civil litigation or a criminal investigation. When this happens, it is important …





