apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCECrisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

Security Design

The Death of Picture Perfect™

Jerry T. Blanchard, Jr., CPPSecurity Program Development

Picture Perfect™, one of the most powerful, proven and widely deployed security management systems in the world is being absorbed by the competition. We all saw it coming, with the acquisition of GE Security by United Technologies Corporation (UTC), and now the “end of support” looming toward the end of 2015. It sounds like a long time, but to transition …

front page news

Front Page News for All the Wrong Reasons

Amanda StricklandBackground Investigation, Security Program Development, Workplace Violence

Over the last couple weeks we have had too many examples of workplace violence and the devastation and the long-term impact it has on the business and the community. As security consultants, we partner with clients to protect their assets, and two of the most critical assets that any company has are its people and its reputation/brand. With that said, …

people texting

Legal Requirements as Mobile Devices Inundate Offices

Amanda StricklandCompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Intellectual Property, Security Program Development

By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …

smartphones

‘Dirty Dozen’ Unsecured Smartphones

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews, Security Program Development

On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …

Loose Lips Sink Ships

Amanda StricklandIntellectual Property

The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …

files of departments

Global Risk Management

Amanda StricklandSecurity Program Development

Mark S. Beasley, PhD, CPA at North Carolina State University was the first professional who started us thinking in terms of business risks being managed as a portfolio instead of the traditional model where each function or department focuses on their associated risks independent of each other. On the surface it seems like a reasonable, efficient, and cost effective approach. …

A Locked Room

Amanda StricklandSecurity Assessment, Theft, Embezzlement, and Fraud

On Monday, an employee reports that there is one monitor missing from the shipment of new monitors that was received the previous Friday. The quantity was verified at delivery by the shipping company and two of your employees. The interior door to the loading dock was locked on Friday evening and was still locked on Monday morning. The roll-up loading …