guns in workplace

Concealed Carry in the Workplace

Chuck Hurst Security Planning, Security Policy and Procedure Development, Workplace Violence

Concealed Carry in the Workplace: A Question of Risk Versus Reward No matter how you interpret the Second Amendment, there are few, if any, hot button issues that raise more passion and stoke the fires of liberty infringed like the right to bear arms. Many have called for increased gun control, to include a ban on assault style rifles, universal …

remote monitoring

Remote Monitoring Software and COVID-19

Russell W. Gilmore, CISSP, CISM, EnCE News, Security Policy and Procedure Development

We find ourselves in very unique times. As of April 3, 2020, there are 311 million people in at least 41 states, three counties, eight cities, the District of Columbia and Puerto Rico being urged to stay home. This rapid change has put many employers in a position to allow employees to work from home. Because of that, employers are …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

UNC system logo

UNC System Safety and Security Conference

Protus3 Clery Act, Crisis Management Planning, News, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Threat Assessment, Title IX, VAWA

Protus3 supported and sponsored the University of North Carolina System at the inaugural UNC System Safety and Security Conference at UNC Asheville. Chris Peterson represented Protus3. The plan for the program is to connect over 200 safety and security professionals throughout the system on an annual basis. The program included tracks for Clery, Student Affairs, Law Enforcement, Legal, Title IX …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Planning, Security Policy and Procedure Development, Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

Department of Education

Department of Education Increases Clery Fines

Protus3 Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, VAWA

The maximum fine for any violation of the Jeanne Clery Act has increased from $35,000 to $54,789. The new fines posted by the US Department of Education in the Federal Register are effective for civil penalties imposed on or after August 1, 2016, whose associated violations occurred after November 2, 2015. The costs for non-compliance just got higher. In recent …

campus safety article

The Security Strategy That Works for Two College Campuses

Christine L. Peterson, CPP, ISP Security Master Planning, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Schematic Design

Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …

Baylor University headline

What Can We Learn From Baylor University?

Protus3 Civil Rights, Clery Act, Compliance, SaVE Act, Security Planning, Security Policy and Procedure Development, Security Program Development, Title IX, Training, VAWA

The Dallas Morning News recently published an article entitled “Sex assault reports at Baylor nearly quadrupled in 2015, report says”. Read the full article here. What can we learn from Baylor University? If campus leaders do not set the example and provide the necessary resources, it is nearly impossible to engage the population in a comprehensive and effective manner. A …

WRAL story August 2016

Security Expert: Police Did a ‘Good Job’ Clearing Crabtree Following Weekend Panic

Protus3 Crisis Management Planning, News, Security Planning, Security Policy and Procedure Development, Security Program Development, Training, Workplace Violence

Raleigh, N.C. — Raleigh police are combing through evidence, including 911 calls and security tapes, from Crabtree Valley Mall in an effort to determine what happened Saturday afternoon in the food court. The sound of gunfire inside sparked panic and sent everyone running out of the mall with their hands up. “I would rather see people run than not run,” …