Preventing Workplace Violence When Terminating An Employee

Ashley Atkins Uncategorized, Workplace Violence

Firing or laying someone off is one of the most stressful situations for a company. Typically, no one in management or human resources wants to be the bearer of bad news to an employee. But of course the stress goes both ways, because it’s also usually a very stressful time for the employee. At the moment someone hears, “We have …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud, Uncategorized

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3 Crisis Management Planning, Security Master Planning, Security Planning, Security Threat Assessment, Uncategorized

As the details continue to emerge from the October 1st mass shooting at the Route 91 Harvest County Music Festival in Las Vegas, there are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The sad truth is that the greatest gains in response to the unthinkable come out of this kind of review …

Stop. Think. Connect.

National Cyber Security Awareness Month (NCSAM) – Week 4

Protus3 Intellectual Property, News, Training, Uncategorized

NCSAM Week 4 – Resources The National Cyber Security Alliance, the other STOP. THINK. CONNECT. ™ founding organizations and many of our partners have created resources, ranging from tip sheets to posters to videos and more, to help you stay safer and more secure online and better protect your personal information. All of these resources are free to use, download …

Jerry T. Blanchard, Jr.

Jerry Blanchard Featured in “Security Systems News”

Protus3 News, Uncategorized

Jerry Blanchard was featured in the “Specifically Speaking” news article in the February 2016 issue of Security Systems New magazine. The “Specifically Speaking “article in the magazine features Q and A with a different security consultant every month. To read all the Q and A’s in the “Specifically Speaking”. Security Systems News magazine proves breaking business news critical to the …

bring your own device

Five Keys to Mobile Phone Security

Russell W. Gilmore, CISSP, CISM, EnCE Uncategorized

Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …

security camera split view

Recorded Video – There When You Need It

Protus3 Uncategorized

Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISP Uncategorized

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …

Loose Lips Sink Ships

Protus3 Uncategorized

The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …