Protos3 logo

Protus3 Awarded Security Consulting Project for OhioHealth

Protus3 News, Security Assessment, Security Master Planning, Security Program Development

Protus3 will provide security consulting services for OhioHealth. Protus3 will assist on facility / operational physical security improvements.  This will include meetings with key personnel, observation of operations and procedures, a limited review and assessment of the existing physical security features as well as the current level of facility “hardening”.  Using the principles,standards of care and best practices, Protus3 consultants …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3 Crisis Management Planning, Security Master Planning, Security Planning, Security Threat Assessment, Uncategorized

As the details continue to emerge from the October 1st mass shooting at the Route 91 Harvest County Music Festival in Las Vegas, there are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The sad truth is that the greatest gains in response to the unthinkable come out of this kind of review …

campus safety article

The Security Strategy That Works for 2 College Campuses

Christine L. Peterson, CPP, ISP Security Master Planning, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Schematic Design

As always, it’s about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical security posture, but …

global integration

Managing Global Integration of Systems

Kevin M. McQuade, CPP Security Master Planning, Security Planning, Security Schematic Design, Security System Bid Process and Evaluation, Security System Concept Development, Security System Design Development, Security System Lifespan Management

During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …

college students

The SaVE Component of the Clery Act

Christine L. Peterson, CPP, ISP Civil Rights, Clery Act, Compliance, SaVE Act, Security Master Planning, Training, VAWA

Are You Ready for October 1, 2014? According to the CDC, on average, 1 in 5 women (18.3%) and 1 in 71 men (1.4%) reported experiencing rape at some time in their lives. In a study of undergraduate women, 19% said that they experienced an attempted or completed sexual assault since entering college (Source: http://www.cdc.gov/violenceprevention/pdf/sv-datasheet-a.pdf). The victimization of college students …

The Difference Between Safety and Security

Christine L. Peterson, CPP, ISP Security Master Planning, Security Program Development

Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need for safety is the second most critical stage to our wellbeing. Whether or not we believe in Maslow’s theory, we can all agree that on its surface …

time

The “Fractional” Security Manager

Protus3 Security Assessment, Security Master Planning, Security Policy and Procedure Development, Security Program Development

The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a security issues they faced such as internal theft, threat to executives, employee malfeasance, compliance issues, or other security problems. These issues turned into the need for an …

gold key in a gold lock

Key Control

William F. Booth, CPP Security Assessment, Security Master Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment

So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …

probability-criticality

Probability and Criticality

William F. Booth, CPP Security Assessment, Security Master Planning, Security Planning, Security Program Development, Security Survey, Security Threat Assessment

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …