circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISPSecurity Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

digital forensics

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCEElectronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …

Department of Education

Department of Education Increases Clery Fines

Amanda StricklandCompliance, Security Program Development

The maximum fine for any violation of the Jeanne Clery Act has increased from $35,000 to $54,789. The new fines posted by the US Department of Education in the Federal Register are effective for civil penalties imposed on or after August 1, 2016, whose associated violations occurred after November 2, 2015. The costs for non-compliance just got higher. In recent …

campus safety article

3 Traits of a Successful Clery Compliance Coordinator

Christine L. Peterson, CPP, ISPCompliance

Campus Safety Magazine published “3 Traits of a Successful Clery Compliance Coordinator”, an article that highlights some of the challenges and nuances facing institutions and Clery Coordinators trying to comply with its requirements. It also drives home that elevating compliance from a departmental/individual response to a coordinated institutional response will drive success. In the business world, this seems like such …

smart card cutaway

Do Your Homework before Moving to Smart Cards

Amanda StricklandSecurity System Design Development

First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …

arrest records

Can You Consider Arrest Records?

Tasha Dyson, CFEBackground Investigation, Compliance

Let’s consider arrest records for a moment. Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions Under Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. § 2000e et seq. published by the Equal Employment Opportunity Commission is an excellent resource. Much of the information in this section comes from that source. …

campus safety article

The Security Strategy That Works for Two College Campuses

Christine L. Peterson, CPP, ISPSecurity Master Planning, Security Program Development, Security System Design Development

Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …

background screening report

What Should You Expect in a Background Screening Report?

Tasha Dyson, CFEBackground Investigation

You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …

criminal history question on application

What is “Ban the Box” and What Does it Mean to You?

Tasha Dyson, CFEBackground Investigation, Compliance, News

Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …

digital forensics expert

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …