layered security

Layered Security and COVID-19

Chuck Hurst News, Security Program Development, Uncategorized

At Protus3, we take great pride in helping our clients identify risks and develop practical and sound strategies to manage, mitigate, and leverage those risks.  Usually those risks involve insider or outsider threats carried out by persons with nefarious intent. The threats come in various forms – overt and plainly visible (think intruder) or covert and not plainly evident (think …

officer

Emergency Assistance in the Age of COVID-19, part 2

Chuck Hurst News

In the first post, we addressed what constitutes an emergency, when to call 911, call prioritization, finite resources, and differing priorities. For good measure, we discussed that the police may alter their level and type of responses to both emergency and non-emergency situations due to COVID-19. In this post, we will attempt to convey and emphasize the importance of not …

law enforcement

Emergency Assistance in the Age of COVID-19, part 1

Chuck Hurst News

Calling 911 to request emergency assistance is ingrained into the mindset of Americans across the nation. Many Americans have no recollection of the patchwork and disjointed processes of the past when you needed emergency assistance. From calling an operator (remember those?), a neighbor who was a cop or firefighter or calling the police directly, it was a convoluted affair that …

we are better together

Risk Assessment Teams

Christine L. Peterson, CPP, ISP Security Program Development, WPV Threat Assessment

We’ve all heard the saying “necessity is the mother of invention” (or innovation). That is absolutely true today. During COVID-19, we have not seen a big shift in how businesses are set up. What we are starting to see is a major shift in multi-disciplined teams working together. As someone who has helped companies develop multi-disciplined risk assessment teams, I …

Remote Work Involves These 3 Cyber Security Risks

Russell W. Gilmore, CISSP, CISM, EnCE News

A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …

remote monitoring

Remote Monitoring Software and COVID-19

Russell W. Gilmore, CISSP, CISM, EnCE News, Security Policy and Procedure Development

We find ourselves in very unique times. As of April 3, 2020, there are 311 million people in at least 41 states, three counties, eight cities, the District of Columbia and Puerto Rico being urged to stay home. This rapid change has put many employers in a position to allow employees to work from home. Because of that, employers are …

Background investigations and COVID-19

Tasha Dyson, CFE Background Investigation, News

In a typical week, I spend a good part of my time conducting background investigations. So what’s different now that we’re all dealing with COVID-19? Honestly? Not much. Nearly every background investigation we conduct includes a criminal search. For locations where the process is automated (i.e. records are online), there is no change based on COVID-19. Records were readily available …

coronavirus COVID-19

Workplace Violence and Coronavirus Disease

Christine L. Peterson, CPP, ISP News, Workplace Violence

We’re beginning to realize that coronavirus disease, COVID-19, will be an event burned into our minds and hearts for generations.  Employees are not receiving paychecks, and unemployment benefits are lagging behind the need. Families, companies, and governments are being pushed to historic limits. When reality finally sets in, there are going to be reactions, including an increase in workplace violence. …