Quantcast
Channel: Protus3 | RSS Feed
Browsing all 31 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What’s missing in your nationwide criminal search?

One of RMA’s core services is investigations, and we do a lot of pre-employment background investigations. We are often asked if we can include a “nationwide criminal search”, and we explain that there...

View Article



Image may be NSFW.
Clik here to view.

The “Fractional” Security Manager

The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a...

View Article

Image may be NSFW.
Clik here to view.

Behind the Scenes of the Recent IHSSF Crime Survey

In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number...

View Article

Image may be NSFW.
Clik here to view.

The Difference Between Safety and Security

Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need...

View Article

Image may be NSFW.
Clik here to view.

The SaVE Component of the Clery Act

Are You Ready for October 1, 2014? According to the CDC, on average, 1 in 5 women (18.3%) and 1 in 71 men (1.4%) reported experiencing rape at some time in their lives. In a study of undergraduate...

View Article


Image may be NSFW.
Clik here to view.

Security Suggestions – The Cloud and Your Data

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”....

View Article

Image may be NSFW.
Clik here to view.

Managing Global Integration of Systems

During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized...

View Article

Image may be NSFW.
Clik here to view.

Avoiding Pandemic Paranoia

Twice during the past decade and a half, the specter of pandemic has been a cause for prudent worry in the public health sector, among business continuity planners, and certainly within the security...

View Article


Image may be NSFW.
Clik here to view.

Data Security: Where There Is Data, There Should Be Policy

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing...

View Article


Image may be NSFW.
Clik here to view.

A Company Model for Developing Policies and Procedures

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his...

View Article

Image may be NSFW.
Clik here to view.

ASIS Women in Security Meeting

Thirteen members of ASIS Chapter 119 attended the quarterly Women in Security meeting, which was held Tuesday, September 15, 2015. This meeting was hosted by Roberta Scoblick and Kathryn Burrell at...

View Article

Image may be NSFW.
Clik here to view.

Reflections on Oregon

Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting...

View Article

RED DART Security Summit

Just recently I attended the 2nd Annual NC RED DART Security Summit. This event is sponsored by the Carolina Chapter of NCMS, Inc. – The Society of Industrial Security Professionals. I was glad to see...

View Article


Image may be NSFW.
Clik here to view.

What Is the Dark Web?

I am not a computer techie. I am an average computer, smart phone, and iPad user. I use the Internet for email, word searches, research, and of course the occasional shopping experience. Have you ever...

View Article

Image may be NSFW.
Clik here to view.

Perimeter Security

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and...

View Article


Image may be NSFW.
Clik here to view.

Bring Your Own Device or BYOD

In business, leaders are very often the conduit between an organization’s vision and the realization of that vision. They are charged with creating an environment that will support the team or teams...

View Article

Image may be NSFW.
Clik here to view.

What’s missing in your nationwide criminal search?

One of RMA’s core services is investigations, and we do a lot of pre-employment background investigations. We are often asked if we can include a “nationwide criminal search”, and we explain that there...

View Article


Image may be NSFW.
Clik here to view.

The “Fractional” Security Manager

The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a...

View Article

Image may be NSFW.
Clik here to view.

Behind the Scenes of the Recent IHSSF Crime Survey

In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number...

View Article

Image may be NSFW.
Clik here to view.

The Difference Between Safety and Security

Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need...

View Article
Browsing all 31 articles
Browse latest View live




Latest Images