bring your own device

Five Keys to Mobile Phone Security

Russell W. Gilmore, CISSP, CISM, EnCE Uncategorized

Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …

security camera split view

Recorded Video – There When You Need It

Protus3 Uncategorized

Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISP Uncategorized

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …

Loose Lips Sink Ships

Protus3 Uncategorized

The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …

RMA flooding in conference room

Every Cloud Has a Silver Lining

Protus3 Uncategorized

  Thank goodness for small blessings and the lack of a traditional work week! Who hasn’t been affected by the economy of the last several years? If someone tells you they haven’t, then they are either fooling you or themselves. Every business has on some level been affected, and this is evident on many levels. We all know that companies …

Crime in decline, but why?

Protus3 Uncategorized

We read an interesting article by Miguel Llanos, a reporter for msnbc.com. “Crime in decline, but why? Low inflation among theories” was published on 9/19/2011. Statistics released by the FBI showed that violent crime and property crimes were declining in 2010. Is this a figment of manipulation within the reporting of crime? Is it attributable to an aging U.S. population …

Safety Versus Security

Protus3 Uncategorized

It is easy to think of safety and security as synonymous terms, but are they really? The confusion is in understanding their differences. In both cases, we are talking about something that could cause harm to another person, many persons, or property. The difference between safety and security is the intent to do harm. If there is water on the …

Why Would You Hire a Consultant?

Protus3 Uncategorized

The years 2010 and 2011 will definitely go down in history as two years where business learned to do more with less. So why would a company consider using a security consultant to work with them on their security program? I can guess what you are thinking – we have security people and the Internet so we can do Google …