infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

UNC system logo

UNC System Safety and Security Conference

Protus3 Clery Act, Crisis Management Planning, News, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Threat Assessment, Title IX, VAWA

Protus3 supported and sponsored the University of North Carolina System at the inaugural UNC System Safety and Security Conference at UNC Asheville. Chris Peterson represented Protus3. The plan for the program is to connect over 200 safety and security professionals throughout the system on an annual basis. The program included tracks for Clery, Student Affairs, Law Enforcement, Legal, Title IX …

FENG logo

Integrated Security Presented to Financial Executive Networking Group

Protus3 News, Security Program Development

Chris Peterson presented What Is Integrated Security and Why Does it Matter to You? to the Raleigh chapter of the Financial Executives Networking Group (FENG) The April meeting was hosted by Drake Berryhill, Managing Director of Accounting Principals, Ajilon, Parker + Lynch, APS Logistics; and Mark Scarbrough of Mass Mutual. The presentation addressed the following questions. What is security? Who …


Chris Peterson Presents at Carolinas AIHA

Protus3 News, Security Program Development

Christine Peterson, CPP, ISP, President of Protus3 spoke at the Carolinas AIHA – Spring 2018 PDC & Conference. The program titled “What is Integrated Security and Why Does It Matter to You?” was presented as a part of a two-day annual training program. This year’s event was attended by over 100 regional Industrial Hygiene professionals. This year’s conference was held …

Protus3 Awarded Project for Founders Federal Credit Union

Protus3 News, Security Assessment, Security Planning

Protus3 was awarded a contract to provide a Physical Security and Security Systems Policies and Procedures Assessment and Audit for Founders Federal Credit Union. The focus of this project includes two distinct components. One is the review of the existing security related policies and procedures for Founders Federal Credit Union (FFCU). The second is evaluating how those policies and procedures …

NCACLEA 2018 Winter Conference

NCACLEA 2018 Winter Conference

Protus3 Civil Rights, Clery Act, News, SaVE Act, Security Assessment, Security Program Development, Title IX, VAWA

Protus3 is a long-term supporter of the NC Association of Campus Law Enforcement Administrators (NCACLEA) both as a presenter and a Corporate Sponsor. This year’s 2018 NCACLEA Winter Conference was hosted by Wake Tech Public Safety department at the WTCC main campus in Raleigh, NC. The NCACLEA does an amazing job of promoting professional standards and supporting the campus law …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3 Crisis Management Planning, Security Master Planning, Security Planning, Security Threat Assessment, Uncategorized

As the details continue to emerge from the October 1st mass shooting at the Route 91 Harvest County Music Festival in Las Vegas, there are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The sad truth is that the greatest gains in response to the unthinkable come out of this kind of review …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Planning, Security Policy and Procedure Development, Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or network access – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. Is this …