power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Security Program Development, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Amanda StricklandComputer Forensics, Electronic Data Recovery, News, Theft, Embezzlement, and Fraud

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

wires entanlged and disorganized in box

Installation and Neatness, It Does Matter

Amanda StricklandSecurity System Lifespan Management, Security System Testing and Commissioning

I have been in this business for over 30 years, and I am still surprised sometimes at what we find when we are asked to perform an assessment of a security system. The picture is a great example of what not to do, however there are companies out there that continue to install systems this way. I am not exactly …

physical security lock

Key Control

William F. Booth, CPPSecurity Assessment, Security Master Planning, Security Program Development

So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …

Lone Star College

Lessons from Lone Star College System

Tasha Dyson, CFENews, Security Program Development, Workplace Violence

On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …

Chained computer

Lock Your Computer

Amanda StricklandTraining

The other day I was in an office, and the receptionist had walked away from her desk. It was obvious that she had not logged out of or locked her computer. She was gone for quite a while, and fortunately no one else entered the area or went up to the desk while she was gone. We all need to …

installation problems

System Commissioning and Integrated Security Systems

Amanda StricklandSecurity Program Development, Security System Testing and Commissioning

As integrated security systems become more prevalent within the corporate, healthcare and government industries, security directors and mangers rely more heavily on their security integrator to verify that all systems work together properly, seamlessly, and as designed. Once an installation has been completed by the integration company, it is recommended that a third-party commission the entire system. This step is …