technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha D. Dyson Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Security Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

GDPR and EU Flag

What is GDPR and does it affect me?

Jerry T. Blanchard, Jr., CPP Compliance, News, Security System Lifespan Management

GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Planning, Security Policy and Procedure Development, Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

smart card cutaway

Do Your Homework before Moving to Smart Cards

Protus3 Security Product Evaluations, Security Schematic Design, Security System Concept Development, Security System Design Development

First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …

Ransomware – All Hope is Not Lost

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, News

Recently Protus3 was asked to assist someone who had fallen prey to ransomware. The person had clicked on an attachment in an email. It wasn’t too long before the message, shown here, popped up on their screen that the ransomware had encrypted all of the files in their My Documents folder. Remembering a recent news article about the identification of …

phone keypad

Are VoIP Phones Secure?

Russell W. Gilmore, CISSP, CISM, EnCE News, Technical Surveillance Countermeasures

A recent article identified and discussed a security flaw in VoIP phones. I am not advocating throwing away your VoIP phone system and going back to analog; I recommend educating yourself to the possible threat, measuring the likelihood of that threat in your environment, and making corrective measures if necessary. Most of the electronic devices we use on a daily …

Security Design

RMA Awarded Brier Creek EMS Design Project

Protus3 News, Security Schematic Design, Security System Bid Process and Evaluation, Security System Budget Development and Estimating, Security System Concept Development, Security System Construction Document Development, Security System Design Development

RMA will provide design and project management services related to the design of electronic security devices for the new Brier Creek EMS Station project. The intent of this design will be to provide access control and security monitoring devices within the main facility. These systems will meet the Wake County standards for this type of facility. Our services will also …

Security Design

Security Systems Commissioning Project for the City of Raleigh

Protus3 News, Security Product Evaluations, Security System Testing and Commissioning

RMA has been awarded the security systems commissioning of the City of Raleigh Critical Public Safety Facility. In this project, RMA will be working directly for RMF Engineering. Risk Management Associates will oversee and participate in the start-up of all security electronic equipment. We will verify and inspect all associated security equipment located in each security room. This will also …

Jerry Blanchard

Jerry Blanchard Presents at ProNet “Security on the Move”

Protus3 News, Security Program Development, Training

ProNet Systems hosted security professionals at a complimentary educational seminar on Tuesday, December 3, 2013, at the Capital City Club in Raleigh, NC. This seminar, titled “Security on the Move” included technology updates and presentations related to remote monitoring of CCTV, access control, and related services either on-site or through the use of hand-held devices. As a member of the …