nationwide criminal record searches from one vendor

What’s Missing in Your Nationwide Criminal Search?

Tasha Dyson, CFE Background Investigation

One of our core services is investigations, and we do a lot of pre-employment background investigations. We are often asked if we can include a “nationwide criminal search”, and we explain that there is no such thing as a public, comprehensive, nationwide criminal record check that searches all courts and jurisdictions. They say, “But I can get one for $19.95 …

WRAL: Security Measures Not Foolproof, Consultant Says

Protus3 Background Investigation, Crisis Management Planning, News, Security Program Development, Workplace Violence

 Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Security Program Development, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Security Program Development, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Protus3 Computer Forensics, Electronic Data Recovery, News, Theft, Embezzlement, and Fraud

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

bricks

Records Checks – House of Cards or Bricks?

Tasha Dyson, CFE Background Investigation

For companies that advertise nationwide records checks, are you getting a house of bricks or a house of cards? Do you remember that scene from My Cousin Vinny when Vinny talks about the prosecution’s case, bricks, and playing cards? “The DA’s going to build a case. Building a case is like building a house. Each piece of evidence is just …

criminal search

Matching Records – No Full Names Please

Tasha Dyson, CFE Background Investigation

We have a client (let’s call them Sub) who is obtaining criminal history information as part of their compliance to another company (let’s call them Prime). Prime states that Sub should “Provide a criminal record check with the applicant’s full legal name.” Sub contracted with RMA to provide that information. When we search, we don’t limit our results to the …

employment application

Check Their References

Tasha Dyson, CFE Background Investigation

I was working on a background investigation for a client recently, and I was reminded of a valuable lesson. (By the way, names and identifying information have been edited in this story, but the circumstances and situations have not.) When we verify employment, normally companies only provide dates of employment and position held. Sometimes companies will tell you whether the …

text message conversation

What is Sextortion?

Protus3 News

Sextortion refers to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion (Source: Wikipedia). In recent months, we have been hired to assist clients who have made the mistake of hitting the send button and wishing there was some way to “get that photo back.” These cases normally involve men …