QR code Protus3 holiday card

A Quick Response Isn’t Always the Best Response

Amanda Strickland Computer Forensics

Recently both state and federal officials have been sending out alerts related to malicious QR (quick response) codes. With the increased use of QR codes, scammers are turning to this technology and redirecting victims to malicious websites. So what is a QR (quick response) code? Basically, it’s a series of squares arranged in a matrix or grid shape to create …

trained response and untrained response graphic

Training to Respond to Workplace Violence

Christine L. Peterson, CPP, ISP Training, Workplace Violence

Last month I wrote about the importance of training as a security tool to support best outcomes in a security event. That post specifically addressed workplace violence and active shooters. Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect us is important for our wellbeing and best outcomes. …

evaluation factors

Reflections on Virginia Beach

Protus3 News, Security Assessment, Training, Workplace Violence

Friday was a very sad day for the city of Virginia Beach as well as our country. Yet another senseless and tragic mass shooting has taken place and has left us with many questions. Why did this happen? How did this happen? Finally, what could have been done to prevent this from happening? Hearts are broken and loved ones have …

Workplace Violence Gets Personal

Christine L. Peterson, CPP, ISP Training, Workplace Violence

Last night I had the opportunity to address the Raleigh Financial Executive Networking Group (FENG) and lead a presentation on Managing Aggressive Behavior & Workplace Violence (workplace violence). This particular opportunity to train industry leaders was especially meaningful to me as I was giving thanks for the safety of one of my nieces. She attends STEM School Highlands Ranch where …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Theft, Embezzlement, and Fraud, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

suspicious bag

See Something. Say Something. Then What?

Protus3 Training

We all have heard at one time or another “If you see something say something.” It’s a way for the public to observe and report suspicious activity that may be an indicator of recent crimes or future crimes. The opportunity came for me to say something at a fast food restaurant in a busy section of town. While pulling into …

response to workplace violence

FBI Workplace Violence Prevention: Readiness and Response

Christine L. Peterson, CPP, ISP Workplace Violence

In January 2011, the FBI published Workplace Violence Prevention: Readiness and Response. This is a fairly lengthy and detailed article that is definitely worth the read. We found this information especially interesting: A handful of high-profile incidents have led to increased public awareness. However, prevalence rates show that nonfatal workplace violence is a more common phenomenon than previously believed.   …

officer

Full-Time versus Part-time Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of …

pink slip

Termination Guidelines

Julius Stanley Carroll, CPP, CFE Security Program Development, Workplace Violence

Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …

law enforcement

Sworn versus Non-Sworn Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Probably the most profound choice in the paradigm is between sworn and non-sworn officers. …