employment application

Yahoo Chief Executive Scott Thompson Steps Down

Tasha Dyson, CFEBackground Investigation, Compliance, Theft, Embezzlement, and Fraud

Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …

BP texting

Government Files First Criminal Charges In BP Oil Spill

Amanda StricklandCompliance, Computer Forensics

As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …

Digital Message Resonance and Its Impact on Economic Advantage

Christine L. Peterson, CPP, ISPSecurity Program Development

Using Social Media Monitoring and Analytics to Protect Human Capital, Company Property, and Your Brand Social Media is a relatively new term that has become ingrained in our consciousness and language, but do you know what it means or encompasses? If you answered no, then you are in the majority. Everyone talks about Social Media, but few really understand it. …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISPCrisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …

emergency-call-box

Maintaining Security Management Systems

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

It is not a secret that most departments within corporations and governments including local, state, and federal have been asked to reduce their budgets by a certain percentage every year since the economy took a turn for the worse. This has been a challenge – especially for security departments. How do you maintain the level of security needed today with …

Jury Says Virginia Tech Negligent

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews

Emergency plans are for doing – not just for having. This recent verdict underlines an important discrepancy between the letter and intent of both the Clery requirements for campus warnings and emergency warning best practices and the way these procedures are implemented in reality in some crisis situations. No matter how comprehensive and well founded an emergency plan is or …

border security

Eye Scanners at England Airports Turned Off

Amanda StricklandNews

Many companies or organizations assume that the addition of technology can be the single solution to a security concern. Companies and organizations depend upon these technologies only to find out later, and after considerable expense, that the technology may not be all it was presented to be. It is always important to remember that the technology is only as good …

chinese flag and numbers

Chinese Hackers Breached Nortel for Years

Amanda StricklandNews

Why is your company in business? You’re probably thinking, “That is obvious. We provide a superior product or service that our customers need.” This leads to three key questions: Do you know what your economic advantage looks like? Are you protecting your economic advantage adequately? How early can you identify leaks and do you have a plan to stop the …

Fine Tune Your Criminal Background Checks

Christine L. Peterson, CPP, ISPBackground Investigation, News

Background screening is an essential tool in today’s business. Choosing the best candidate for the job requires due diligence on the part of management. An effective screening policy protects the business, its assets, and ultimately increases a positive return on the investment. We recommend a policy that is flexible but non-discriminatory because it aligns the scope with the position. The …

daniel-benjamin

State Department Launches Counter-Terror Bureau For Threats Abroad

Amanda StricklandSecurity Program Development

If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. We know you are in risk overload, but the fact that the federal government has created a Bureau of Counterterrorism beginning January 4, 2012, tells you that the threat is so great that …