What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …
A Delicate Balance, part 1 – Police Service
Where is a cop when you need one? The answer depends on where you live. Data reported by law enforcement agencies to the FBI depict a wide variation in the size of departments across the nation. Despite what you may hear or have read, there is no national standard for how many police officers a department needs or any type of …
Coronavirus Response
Consistent with Protus3’s commitment to help our clients plan and protect in order to prosper, we are monitoring the situation caused by the Coronavirus Disease 2019 (COVID-19). On March 11, the World Health Organization (WHO) elevated the outbreak classification to an official pandemic. Protus3 continues to evaluate our operations and continuity plans in order to provide for the ongoing health …
Perimeter Security
Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …
RMA Completes Security Assessment of RTP
Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …
Jerry Blanchard Attends Paradigm 2013
Jerry Blanchard was invited to attend Paradigm 2013, a specifier technology symposium held by Lenel. Paradigm, Lenel’s annual consultant symposium, is a unique experience that is educational, interactive, and fun! Through presentations, demonstrations, and hands-on training sessions consultants become familiar with Lenel’s latest technologies and learn what’s coming next. In addition, roundtable discussions will provide an opportunity to offer feedback …
Terminating an Employee and Company Data
Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …
Security in the Office – A Checklist
How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …
RMA Attends NCACLEA Summer Conference
RMA was pleased to be able to support the North Carolina Association of Campus Law Enforcement Administrators as a vendor at their 40th Anniversary Summer Conference. The conference was a three-day event held in Charlotte, NC, on July 10-12. At the luncheon on July 11, campus law enforcement leaders and organization members who had retired in 2012-2013 were recognized. One …
Security Assessment of RTP
Risk Management Associates, Inc. will be conducting a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation needs to conduct a security assessment that will provide the stakeholders with …