Source: National Weather Service: National Hurricane Center History teaches that a lack of hurricane awareness and preparation are common threads among all major hurricane disasters. By knowing your vulnerability and what actions you should take, you can reduce the effects of a hurricane disaster. Be Prepared Preventing the loss of life and minimizing the damage to property from hurricanes are …
Safety Versus Security
It is easy to think of safety and security as synonymous terms, but are they really? The confusion is in understanding their differences. In both cases, we are talking about something that could cause harm to another person, many persons, or property. The difference between safety and security is the intent to do harm. If there is water on the …
Global Risk Management
Mark S. Beasley, PhD, CPA at North Carolina State University was the first professional who started us thinking in terms of business risks being managed as a portfolio instead of the traditional model where each function or department focuses on their associated risks independent of each other. On the surface it seems like a reasonable, efficient, and cost effective approach. …
Sharing Protected Information
Jim was looking for ways to make Acme’s production process more efficient. He ran a search on the Internet for their new process, and he also wanted to see if their competitors had figured it out yet. One of the search hits was an image, and it looked like there was a TX1000 machine in the background. He took a …
The Cost of Security
The former director of a North Carolina Central University program designed to help minority students used an unauthorized bank account to divert more than $1 million from the program over six years, according to a state audit (WRAL News Story). What can we learn from this story? It’s usually easier and cheaper for companies and organizations to be proactive rather …
Why Would You Hire a Consultant?
The years 2010 and 2011 will definitely go down in history as two years where business learned to do more with less. So why would a company consider using a security consultant to work with them on their security program? I can guess what you are thinking – we have security people and the Internet so we can do Google …
Emergencies and Visitors
John looked out across the lobby at the growing crowd. Mondays were always busy, but the crowd seemed larger than usual today. Because of the storms on the horizon, no one was waiting on the front sidewalk. His phone buzzed, and he saw a notification from his weather app. At the same time, he heard a warning from the …
Emergency Situations and Situational Awareness
Most of us have practiced fire drills at work and have thought about where to take shelter from a tornado when at home. The tornados and severe weather hit North Carolina on a Saturday, a day when many people are away from work and home. In general, we spend most of our time at work or at home. Hopefully, we …
Business Continuity Planning and the Protection of the Supply Chain
As security consultants, we have the privilege of working for multiple companies and agencies around the globe, which gives us deeper insight into how businesses typically view, plan, and prepare for the unexpected. Too often, however, it seems we are brought into the security process in a remedial role, after an unforeseen and unprepared for event. In the current economy, …
Expert: Terrorists Look to Hide Bombs in Common Items
This story was originally broadcast on WRAL and posted on their website on November 5, 2010. Raleigh, N.C. — The two mail bombs bound for Chicago that were found in printer cartridges on international flights last week have added a new twist to counter-terrorism efforts in the United States. “The smart bad guys will look at what you’re doing and …



