What’s missing in your nationwide criminal search?
One of RMA’s core services is investigations, and we do a lot of pre-employment background investigations. We are often asked if we can include a “nationwide criminal search”, and we explain that there...
View ArticleThe “Fractional” Security Manager
The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a...
View ArticleBehind the Scenes of the Recent IHSSF Crime Survey
In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number...
View ArticleThe Difference Between Safety and Security
Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need...
View ArticleThe SaVE Component of the Clery Act
Are You Ready for October 1, 2014? According to the CDC, on average, 1 in 5 women (18.3%) and 1 in 71 men (1.4%) reported experiencing rape at some time in their lives. In a study of undergraduate...
View ArticleSecurity Suggestions – The Cloud and Your Data
I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”....
View ArticleManaging Global Integration of Systems
During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized...
View ArticleAvoiding Pandemic Paranoia
Twice during the past decade and a half, the specter of pandemic has been a cause for prudent worry in the public health sector, among business continuity planners, and certainly within the security...
View ArticleData Security: Where There Is Data, There Should Be Policy
The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing...
View ArticleA Company Model for Developing Policies and Procedures
While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his...
View ArticleASIS Women in Security Meeting
Thirteen members of ASIS Chapter 119 attended the quarterly Women in Security meeting, which was held Tuesday, September 15, 2015. This meeting was hosted by Roberta Scoblick and Kathryn Burrell at...
View ArticleReflections on Oregon
Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting...
View ArticleRED DART Security Summit
Just recently I attended the 2nd Annual NC RED DART Security Summit. This event is sponsored by the Carolina Chapter of NCMS, Inc. – The Society of Industrial Security Professionals. I was glad to see...
View ArticleWhat Is the Dark Web?
I am not a computer techie. I am an average computer, smart phone, and iPad user. I use the Internet for email, word searches, research, and of course the occasional shopping experience. Have you ever...
View ArticlePerimeter Security
Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and...
View ArticleBring Your Own Device or BYOD
In business, leaders are very often the conduit between an organization’s vision and the realization of that vision. They are charged with creating an environment that will support the team or teams...
View ArticleWhat’s missing in your nationwide criminal search?
One of RMA’s core services is investigations, and we do a lot of pre-employment background investigations. We are often asked if we can include a “nationwide criminal search”, and we explain that there...
View ArticleThe “Fractional” Security Manager
The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a...
View ArticleBehind the Scenes of the Recent IHSSF Crime Survey
In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number...
View ArticleThe Difference Between Safety and Security
Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need...
View Article
More Pages to Explore .....