security checkup

Security Program Check-up Should Be Held Annually

Amanda StricklandSecurity Master Planning, Security Program Development

When was the last time that your security program had a check-up? We all know that we should visit our physician for an annual check-up or physical. This is the time to discuss with your doctor any issues or symptoms you may be having. Your doctor will examine you to make sure everything checks out ok. The same should hold …

law enforcement

When Not to Call the Police

Chuck HurstBackground Investigation, Theft, Embezzlement, and Fraud

I used to be a cop. Served proudly, retired and kicked back, all set to enjoy my pension. Any cop who tells you they have seen it all and done it all would be prone to exaggeration, to put it politely. During my career, I shared a multitude of experiences —- from outright hilarious to downright heartbreaking. While I was …

Continuing Education

“The Protus3 CLE is applicable to both work and real life.  It was very interesting to consider how the training offered could be utilized in many areas. The workplace violence segment contained valuable conflict resolution training that would be beneficial to use with co-workers, clients, family, and friends. I came away understanding that it is nearly impossible today to not leave a trail …

worried woman

Sexual Harassment: Organizational Integrity and Perception

Chuck HurstCompliance, News

During the course of one’s life, it is said that your reputation precedes you in every facet of your life. It goes in the door before you ever set foot in a courtroom, boardroom, operating room, classroom, or boiler room. It doesn’t matter if you are white collar or blue collar; a person’s reputation matters. Does the same hold true …

article from The Hacker News

Keyboard App Leaks Mobile Data

Amanda StricklandComputer Forensics, Mobile Forensics, News

Sometimes mobile apps do more than we think they do. Researchers at the Kromtech Security Center discovered personal data being collected by a smartphone virtual keyboard app on its 31 million users, as reported by The Hacker News. The leaked information included: Full name, phone number, and email address Device name, screen resolution, and model details Android version, IMSI number, …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Amanda StricklandCrisis Management Planning, Security Master Planning, Security Program Development

Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …

OIG guide for audits

Possible Clery Act Compliance “Game Changer”

Christine L. Peterson, CPP, ISPCompliance, News

Clery Act Compliance “Game Changer”– What Is It? Why Does It Matter? Security professionals inherently know the steps to make a case – one thing leads to another and then connect the dots. At colleges and universities, security leadership is acutely aware that they play a large role in Clery Act compliance. They also understand that an investigation by ED …

Higher Education Clery Act

Clery Act Changes: Challenges Facing Higher Education

Christine L. Peterson, CPP, ISPCompliance, News

The primary role of an institution of higher learning is to educate, and their greatest asset is their reputation. Government entities and donors generate a significant portion of an institution’s revenue. Non-compliance jeopardizes this revenue. How can it be reasonable that Clery Act and Title IX compliance is so lacking in resources and emphasis? Some of the answers, if not …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

Question Mark Key on Computer Keyboard[/caption]>I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, …