laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

UNC system logo

UNC System Safety and Security Conference

Protus3 Clery Act, Crisis Management Planning, News, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Threat Assessment, Title IX, VAWA

Protus3 supported and sponsored the University of North Carolina System at the inaugural UNC System Safety and Security Conference at UNC Asheville. Chris Peterson represented Protus3. The plan for the program is to connect over 200 safety and security professionals throughout the system on an annual basis. The program included tracks for Clery, Student Affairs, Law Enforcement, Legal, Title IX …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Planning, Security Policy and Procedure Development, Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

Department of Education

Department of Education Increases Clery Fines

Protus3 Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, VAWA

The maximum fine for any violation of the Jeanne Clery Act has increased from $35,000 to $54,789. The new fines posted by the US Department of Education in the Federal Register are effective for civil penalties imposed on or after August 1, 2016, whose associated violations occurred after November 2, 2015. The costs for non-compliance just got higher. In recent …

campus safety article

The Security Strategy That Works for Two College Campuses

Christine L. Peterson, CPP, ISP Security Master Planning, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Schematic Design

Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …

Baylor University headline

What Can We Learn From Baylor University?

Protus3 Civil Rights, Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Title IX, Training, VAWA

The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …

WRAL story August 2016

Security Expert: Police Did a ‘Good Job’ Clearing Crabtree Following Weekend Panic

Protus3 Crisis Management Planning, News, Security Planning, Security Policy and Procedure Development, Security Program Development, Training, Workplace Violence

Raleigh, N.C. — Raleigh police are combing through evidence, including 911 calls and security tapes, from Crabtree Valley Mall in an effort to determine what happened Saturday afternoon in the food court. The sound of gunfire inside sparked panic and sent everyone running out of the mall with their hands up. “I would rather see people run than not run,” …

Beth Israel Deaconess Medical Center

Protus3 Awarded Beth Israel Deaconess Medical Center Project

Protus3 News, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment

Protus3 will perform an assessment of security practices, policies and procedures, and facilities standards at Beth Israel Deaconess Medical Center. A Task Force within BIDMC has been charged with providing recommendations to Senior Management and the BIDMC Board of Directors concerning changes to BIDMC’s security practices. The purpose of this study is to provide to the Task Force a thorough …

Campus Safety threat assessment article

3 Mistakes That Can Derail Your Threat Assessment Process

Christine L. Peterson, CPP, ISP Security Policy and Procedure Development, Workplace Violence, WPV Threat Assessment

Campus Safety Magazine published 3 Mistakes That Can Derail Your Threat Assessment Process. Although this article addresses students in an educational environment, it includes lessons for employers as well. How can security professionals protect the individual as well as the whole community? Violence in the workplace is more common than many believe – and it is also often predictable and …