Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Embezzlement, Fraud, Security Planning, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

college students

Security Threat Assessments for Education

Protus3 Security Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …


Probability and Criticality

William F. Booth, CPP Security Assessment, Security Master Planning, Security Planning, Security Program Development, Security Survey, Security Threat Assessment

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …

Security Consulting

RMA Begins Security Assessment of Hartford Hospital

Protus3 News, Security Program Development, Workplace Violence

Risk Management Associates, Inc. was awarded the contract to perform a Security Assessment of Hartford Hospital. The purpose of the analysis is to evaluate the security threats at each of the campuses, identify gaps in the current security program, and recommend measures that Hartford Hospital should consider going forward to mitigate risk levels and the severity of risks. Included in this …


‘Dirty Dozen’ Unsecured Smartphones

Billy Gordon Green, Jr. M.Ed., CPP, CHS News, Security Program Development

On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …

files of departments

Global Risk Management

Protus3 Security Program Development

Mark S. Beasley, PhD, CPA at North Carolina State University was the first professional who started us thinking in terms of business risks being managed as a portfolio instead of the traditional model where each function or department focuses on their associated risks independent of each other. On the surface it seems like a reasonable, efficient, and cost effective approach. …

Security Consulting

RMA Awarded Project for Rowan-Cabarrus Community College

Protus3 News, Training

Risk Management Associates has been awarded a project to provide Security Consulting Services for Rowan-Cabarrus Community College. RMA will deliver a comprehensive security report that addresses the security risk-based requirements of each campus including a security threat assessment, a Security Risk Assessment Report, a Security Master Plan, and a Crisis Action Plan. RMA will produce a “emergency quick response” guide …


Be Prepared to Stand Alone: Planning for Weather Related Emergencies

Protus3 Security Program Development

No one can control the weather, and weather can only be predicted accurately for a day or so into the future. With regard to specific locations, severe weather that can create extreme conditions and pose threats to life and property can only be predicted a few hours or a few minutes in advance. Within this parameter, weather emergencies may occur …

Preparing for the Ordinary Means Protection for the Extraordinary

Protus3 Security Program Development

Although this article was originally written for electrical utilities, the concepts apply to other companies and organizations. Darren Nix of Risk Management Associates authored this article originally published in Security Products Magazine. Increased security at Electrical Utility companies for the prevention of ordinary events also provides protection for the extraordinary events. There has been a tremendous focus on protecting our …

Creating a Master Plan

Protus3 Security Program Development

The process of developing a Master Security Plan begins with and has its foundation in the information, outcomes and recommendations of the assessment activities. Creating an integrated security plan to guide a security program is rooted in the existing organization, policies and procedures, culture and characteristics of the population. Each of these is surveyed and determined during the security survey/vulnerability …