Protos3 logo

Security Assessment Project for BIDMC Plymouth

Protus3 News, Security Assessment, Security Survey

Protus3 will conduct a Security Assessment for Beth Israel Deaconess Medical Center – Plymouth. This project will focus on the risk assessment of the Public Safety Department. Protus3 will also look at the overall security program at the hospital beginning with the identification of its most critical assets and the threats to those assets. Finally, Protus3 will review the overall …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha D. Dyson Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

University of Maryland Eastern Shore

Assessment at University of Maryland Eastern Shore

Protus3 News, Security Assessment, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. completed its assessment of the University of Maryland Eastern Shore security program. The assessment began with the review of security-related policies and procedures and other related documents. Members of the RMA team visited the UMES campus to conduct independent observations and interviews with approximately 100 individual stakeholders. Local law enforcement was contacted, and both police calls …

Christine Peterson

RMA Presents at CSI Week at Meredith College

Protus3 Embezzlement, Fraud, News, Theft, Embezzlement, and Fraud, Training

Chris Peterson presented Enemies at the Gate – or Are They Already Inside? as part of CSI Week at Meredith College. CSI Week allows students at Meredith to explore career opportunities in law enforcement and related fields. The event is sponsored by the Sociology and Criminology Programs, and the Sociology & Criminology Club (and with the support of Political Science, …

pink slip

Termination Guidelines

Julius Stanley Carroll, CPP, CFE Security Program Development, Workplace Violence, WPV Support

Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

Christine Peterson

RMA Presents BYOD Policies at RTP CFO Forum

Protus3 News, Security Program Development, Training

Chris Peterson and http://www.rmasecurity.com/about-rma/team-profiles/russell-w-gilmore/ presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …