laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Program Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

Campus Safety Article

Campus Security: Parents So Concerned They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISP News, Security Program Development, Workplace Violence

Campus security and safety of students, faculty, staff and infrastructure should be a foregone conclusion. Unfortunately, it is not. Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. Active Shooter Events Time and again we are horrified by active shooter events targeting …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFE Compliance, Security Program Development, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

security checkup

Security Program Check-up Should Be Held Annually

Protus3 Security Master Planning, Security Program Development

When was the last time that your security program had a check-up? We all know that we should visit our physician for an annual check-up or physical. This is the time to discuss with your doctor any issues or symptoms you may be having. Your doctor will examine you to make sure everything checks out ok. The same should hold …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3 Crisis Management Planning, Security Master Planning, Security Program Development

Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …