Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584
Security in the Office – A Checklist
How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …
Key Control
So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …
Security Threat Assessments for Education
In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …
Hotel Locks
Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …
Access Card – Keys to the Building
As most of us know, an access card or credential is a key to gain entry to a parking lot, building, or other secured space. Why then do so many people leave their card in their car after work? Some even hang them from their mirror. When I ask, the response I usually get is “it is more convenient and …
Security Threat – Consider the Extremes
When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …
The Death of Picture Perfect™
Picture Perfect™, one of the most powerful, proven and widely deployed security management systems in the world is being absorbed by the competition. We all saw it coming, with the acquisition of GE Security by United Technologies Corporation (UTC), and now the “end of support” looming toward the end of 2015. It sounds like a long time, but to transition …
Intruder in the Attic
The original news story can be found here. An ex-boyfriend from twelve years ago came back to haunt a woman – literally. A single mother of five children in Rock Hill, South Carolina, thought an animal had gotten into her attic when she heard a thump and then saw some nails popping out from her bedroom ceiling one night. Her …
Front Page News for All the Wrong Reasons
Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …









