laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

three people texting

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Mobile Forensics, Security Policy and Procedure Development

With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may become unsuspecting and unwilling participants. These “collateral damage” participants often have no say in how these risks are managed. Read more about the BYOD Wild …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Planning, Security Policy and Procedure Development, Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or network access – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. Is this …

Department of Education

Department of Education Increases Clery Fines

Protus3 Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, VAWA

The maximum fine for any violation of the Jeanne Clery Act has increased from $35,000 to $54,789. The new fines posted by the U.S. Department of Education in the Federal Register are effective for civil penalties imposed on or after August 1, 2016, whose associated violations occurred after November 2, 2015. The costs for non-compliance just got higher. In recent …

campus safety article

The Security Strategy That Works for 2 College Campuses

Christine L. Peterson, CPP, ISP Security Master Planning, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Schematic Design

As always, it’s about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical security posture, but …

Baylor University headline

What can we learn from Baylor University?

Protus3 Civil Rights, Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Title IX, Training, VAWA

The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …

WRAL story August 2016

Security expert: Police did a ‘good job’ clearing Crabtree following weekend panic

Protus3 Crisis Management Planning, News, Security Planning, Security Policy and Procedure Development, Security Program Development, Training, Workplace Violence

This story originally appeared on WRAL. Read the original story here. Raleigh, N.C. — Raleigh police are combing through evidence, including 911 calls and security tapes, from Crabtree Valley Mall in an effort to determine what happened Saturday afternoon in the food court. The sound of gunfire inside sparked panic and sent everyone running out of the mall with their …

Beth Israel Deaconess Medical Center

Protus3 Awarded Beth Israel Deaconess Medical Center Project

Protus3 News, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment

Protus3 will perform an assessment of security practices, policies and procedures, and facilities standards at Beth Israel Deaconess Medical Center. A Task Force within BIDMC has been charged with providing recommendations to Senior Management and the BIDMC Board of Directors concerning changes to BIDMC’s security practices. The purpose of this study is to provide to the Task Force a thorough …

High Stakes Cyber article

Private Companies Can be Liable for Failing to Maintain Adequate Cyber Security

Christine L. Peterson, CPP, ISP Compliance, Corporate Compliance, Intellectual Property, News, Security Policy and Procedure Development

How much customer data do you have? Is it secure? You should read High Stakes Cyber as published in Security Management. In brief, the FTC can hold companies liable for failing to maintain adequate cybersecurity, even though the commission has not defined minimum cybersecurity standards through rules or regulations. Even in this case, the court did not articulate a minimum …