Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …
Termination Guidelines
Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …
WRAL: Security Measures Not Foolproof, Consultant Says
Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584
Security in the Office – A Checklist
How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …
Hidden Costs of Security Problems
What are the hidden costs of security problems? On Wednesday, April 10, 2013, staff members at the Louvre in Paris staged a protest, and the museum did not open. (Read the full story from the BBC here.) They were not protesting about wages, benefits, or hours. They were protesting about a security problem. Pickpockets are apparently a huge problem at …
Identity Theft – Where’s Your Wallet?
Identity theft is talked about constantly, and when it happens to someone, their response is normally “I don’t know how this happened to me”. Sometimes it is just too easy. On a recent business trip – to a security conference no less – as we walked into a restaurant for breakfast we passed an empty booth with no one close …
Lessons from Lone Star College System
On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …
The Webcam – Who’s Watching You?
Predators could be spying on you through your computer’s webcam. Criminals are now able to hack in and watch your every move – without you ever knowing it. Scary, right? We’re all guilty of it: we use our computer, get distracted with something, and just walk away. We forget the computer is still on – and this is the key …
Hotel Locks
Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …
Be Aware
Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …