What is Your Security Culture?

Tasha D. Dyson Security Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

BID-P Project Completed

Protus3 News, Security Assessment, Security Survey

Protus3 has completed a Limited Scope Security Assessment of the Public Safety Department for Beth Israel Deaconess Hospital – Plymouth (BID-P). The project was awarded to Protus3 in November 2018. This security assessment examined various aspects of the existing security program. In conjunction with the requirements set forth by the Joint Commission, Protus3 reviewed the Security Management Plan to determine …

Sarasota County

Sarasota County Administration Building System Assessment

Protus3 News, Security Assessment, Security Master Planning, Security Survey

Protus3 completed a Security Assessment of the Sarasota County Administration Building. The objective was to obtain a “snapshot” view of the state of security at the Administrative Building, identify gaps in the current security program, and develop a Master Plan that Sarasota County can implement in a cost effective and efficient manner. Sarasota County awarded the project to Protus3 in …

Christine Peterson

NCDBA Women’s Innovation and Leadership Forum

Protus3 News

Christine Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the North Carolina Defense Business Association (NCDBA) Women’s Innovation and Leadership Forum. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, …

Integrated Security Program at Institute of Management Accountants

Protus3 News, Security Planning, Security Program Development

Chris Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the Institute of Management Accountants. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, while integrating and operating a security program …

Protos3 logo

Protus3 Awarded Security Consulting Project for OhioHealth

Protus3 News, Security Assessment, Security Master Planning, Security Program Development

Protus3 will provide security consulting services for OhioHealth. Protus3 will assist with facility and operational physical security improvements.  First, Protus3 will meet with key personnel and conduct observations of operations and procedures. The project will also include a limited review and assessment of the existing physical security features. Protus3 will also review the current level of facility “hardening”.  Using the …

Christine Peterson

Integrated Security at Rotary Club of Crabtree

Protus3 News, Security Program Development

Chris Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the Rotary Club of Crabtree. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, while integrating and operating a security program …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha D. Dyson Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

GDPR and EU Flag

What is GDPR and does it affect me?

Jerry T. Blanchard, Jr., CPP Compliance, News, Security System Lifespan Management

GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …