In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …
Is the Answer on a Mobile Device?
Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …
Department of Education Increases Clery Fines
The maximum fine for any violation of the Jeanne Clery Act has increased from $35,000 to $54,789. The new fines posted by the US Department of Education in the Federal Register are effective for civil penalties imposed on or after August 1, 2016, whose associated violations occurred after November 2, 2015. The costs for non-compliance just got higher. In recent …
3 Traits of a Successful Clery Compliance Coordinator
Campus Safety Magazine published “3 Traits of a Successful Clery Compliance Coordinator”, an article that highlights some of the challenges and nuances facing institutions and Clery Coordinators trying to comply with its requirements. It also drives home that elevating compliance from a departmental/individual response to a coordinated institutional response will drive success. In the business world, this seems like such …
Do Your Homework before Moving to Smart Cards
First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …
Can You Consider Arrest Records?
Let’s consider arrest records for a moment. Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions Under Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. § 2000e et seq. published by the Equal Employment Opportunity Commission is an excellent resource. Much of the information in this section comes from that source. …
The Security Strategy That Works for Two College Campuses
Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …
What Should You Expect in a Background Screening Report?
You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …
What is “Ban the Box” and What Does it Mean to You?
Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …
Five Computer Forensics Myths Debunked
The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …










