Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …
FBI Tech Tuesday: Building a Digital Defense Against Travel Scams
The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …
RMA Presents at CSI Week at Meredith College
Chris Peterson presented Enemies at the Gate – or Are They Already Inside? as part of CSI Week at Meredith College. CSI Week allows students at Meredith to explore career opportunities in law enforcement and related fields. The event is sponsored by the Sociology and Criminology Programs, and the Sociology & Criminology Club (and with the support of Political Science, …
RMA Completes Security Assessment of RTP
Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …
WRAL: Security Measures Not Foolproof, Consultant Says
Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584
Held Hostage by a Dishonest Employee
I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …
Security in the Office – A Checklist
How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …
Security Assessment of RTP
Risk Management Associates, Inc. will be conducting a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation needs to conduct a security assessment that will provide the stakeholders with …
Hidden Costs of Security Problems
What are the hidden costs of security problems? On Wednesday, April 10, 2013, staff members at the Louvre in Paris staged a protest, and the museum did not open. (Read the full story from the BBC here.) They were not protesting about wages, benefits, or hours. They were protesting about a security problem. Pickpockets are apparently a huge problem at …
Identity Theft – Where’s Your Wallet?
Identity theft is talked about constantly, and when it happens to someone, their response is normally “I don’t know how this happened to me”. Sometimes it is just too easy. On a recent business trip – to a security conference no less – as we walked into a restaurant for breakfast we passed an empty booth with no one close …