A Delicate Balance, part 2 – Law Enforcement

Chuck Hurst News

During “normal” times the police generally control the masses because the masses allow that control. Or to put it another way, the public allows law enforcement to do their jobs. Thus the delicate balance and fragile trust relationship is born. These are not normal times! Just consider that within the framework of racial strife, societal unrest, police misconduct, political polarization …

officer

A Delicate Balance, part 1 – Police Service

Chuck Hurst News

Where is a cop when you need one? The answer depends on where you live. Data reported by law enforcement agencies to the FBI depict a wide variation in the size of departments across the nation. Despite what you may hear or have read, there is no national standard for how many police officers a department needs or any type of …

layered security

Layered Security and COVID-19

Chuck Hurst News, Security Program Development

At Protus3, we take great pride in helping our clients identify risks and develop practical and sound strategies to manage, mitigate, and leverage those risks.  Usually those risks involve insider or outsider threats carried out by persons with nefarious intent. The threats come in various forms – overt and plainly visible (think intruder) or covert and not plainly evident (think …

lock take hide signs

What is Your Security Culture?

Tasha Dyson, CFE Security Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha Dyson, CFE Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

GDPR and EU Flag

What is GDPR and does it affect me?

Jerry T. Blanchard, Jr., CPP Compliance, News, Security System Lifespan Management

GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …

security checkup

Security Program Check-up Should Be Held Annually

Protus3 Security Master Planning, Security Program Development

When was the last time that your security program had a check-up? We all know that we should visit our physician for an annual check-up or physical. This is the time to discuss with your doctor any issues or symptoms you may be having. Your doctor will examine you to make sure everything checks out ok. The same should hold …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3 Crisis Management Planning, Security Master Planning, Security Program Development

Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …