coronavirus COVID-19

Coronavirus Response

Protus3 Crisis Management Planning, News

Consistent with Protus3’s commitment to help our clients plan and protect in order to prosper, we are monitoring the situation caused by the Coronavirus Disease 2019 (COVID-19). On March 11, the World Health Organization (WHO) elevated the outbreak classification to an official pandemic. Protus3 continues to evaluate our operations and continuity plans in order to provide for the ongoing health …

snow in Raleigh

Weather-Related emergencies

Billy Gordon Green, Jr. M.Ed., CPP, CHS News, Security Program Development

Weather-related emergencies create an operational environment in which the security department may have to stand alone for minutes, hours, or days without significant assistance from outside agencies. Although relatively localized on a broad geographic scale, a weather emergency may affect everyone and everything in a specific area. The scope of such disasters often overwhelms public safety response for hours or …

new model of leakage

Employment Law: Can You Police Social Media?

Protus3 Compliance

Guest blogger Mimi Soule specializes in employment law at the Soule Law Firm in Raleigh, North Carolina. This article was originally published on the website of Forrest Firm. Lately, the National Labor Relations Board (NLRB) is taking a particularly active interest in employer polices regarding social media. For those of us living and working in a Right-to-Work state like North …

Security Design

The Death of Picture Perfect™

Jerry T. Blanchard, Jr., CPP Security Program Development

Picture Perfect™, one of the most powerful, proven and widely deployed security management systems in the world is being absorbed by the competition. We all saw it coming, with the acquisition of GE Security by United Technologies Corporation (UTC), and now the “end of support” looming toward the end of 2015. It sounds like a long time, but to transition …

Security Consulting

RMA Begins Security Assessment of Hartford Hospital

Protus3 News, Security Program Development, Workplace Violence

Risk Management Associates, Inc. was awarded the contract to perform a Security Assessment of Hartford Hospital. The purpose of the analysis is to evaluate the security threats at each of the campuses, identify gaps in the current security program, and recommend measures that Hartford Hospital should consider going forward to mitigate risk levels and the severity of risks. Included in this …

people texting

Legal Requirements as Mobile Devices Inundate Offices

Protus3 Business Continuity Planning, Compliance, Computer Forensics, Corporate Compliance, Crisis Management Planning, Electronic Data Recovery, Intellectual Property, Security Planning, Security Policy and Procedure Development, Security Program Development, Technical Surveillance Countermeasures

By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …

BP texting

Government Files First Criminal Charges In BP Oil Spill

Protus3 Compliance, Computer Forensics

As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISP Business Continuity Planning, Counterfeiting, Crisis Management Planning, Diversion, Embezzlement, Fraud, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Tampering, Theft, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …

laptop with lock on it

When Employees Leave, Data Should Stay

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …

Iran Reports Killing of Nuclear Scientist in ‘Terrorist’ Blast

Billy Gordon Green, Jr. M.Ed., CPP, CHS News

Move over Bering Sea crab fishermen. There is a new “Most Dangerous Job in the World” – scientist in the Iranian nuclear weapons program. The assassination in January was the fourth in two years. This is another successful use of a motorcycle team to attach a small but effective explosive device to a car trapped in traffic with immediate initiation. …