National Classification Management Society Carolinas Chapter

NCMS Holds Quarterly Business Meeting at Cisco Systems

Protus3 News

The NCMS Society of Industrial Security Professionals Carolina Chapter held is quarterly business meeting at Cisco Systems in Research Triangle Park on May 29, 2015. Christine Peterson, CPP, ISP and founding member of the chapter, attended the meeting which focused on Information Systems Security. Mark Whitteker, MSIA, CISSP, ISP the Manager of Government Security & IT Services was the lead …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are …

Rusty Gilmore

Rusty Gilmore Speaks at the ASIS Chapter 119 Monthly Meeting

Protus3 Computer Forensics, News, zzzInvestigation

On Wednesday January 21, 2015, the local Chapter of ASIS International, ASIS Chapter 119 held their monthly meeting at the PNC Center in Raleigh, NC. Rusty Gilmore was the guest speaker. Rusty gave a presentation on Computer and Network Vulnerabilities: Steps to Protecting Your Systems and Data.

Rusty Gilmore

Rusty Gilmore Presents at the ProNet Systems Executive Briefing 2014

Protus3 Computer Forensics, News, Training

The annual ProNet Systems Executive Briefing was held on December 9, 2014, at the City Club in Raleigh, NC. The event was titled, “Keeping up with Security Trends and Technologies.” Some of the key speakers included: Alan Jelley, ProNet Systems, Inc. – New Technology Advancements and Trends Nathan Schroeder, Focus Sales; Ryan Bach, Avigilon – Totally Integrated Access & High …

the cloud

Security Suggestions – The Cloud and Your Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Intellectual Property

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”. Hopefully I will answer these questions as I discuss ways to keep your data secure on the Cloud. There are a …

ASU administration building

Security Assessment at Appalachian State University

Protus3 News, Security Assessment, Security Planning, Security Program Development, Security Survey, Security Threat Assessment

The specific objective of this project was to provide the University with a “snapshot” of the existing security program in place at the BB Dougherty Administration Building, any gaps in the program, and potential responses to the gaps identified. Security policy, procedures, systems and organization were examined for level of technology, appropriate application, and the efficiency and effectiveness of deployment. …

Dana Frentz

Dana Frentz Attends IAHSS Annual General Meeting

Protus3 News, zzzSecurity

Dana Frentz attended the 46th IAHSS Annual General Meeting in San Diego, CA, May 18, 2014, through May 21, 2014. The meeting was held at The Hyatt La Jolla. Speakers and topics included: • Keynote Chris Van Gorder – Security Officer to Present Day CEO • Russell Jones, PhD, CPP, CHPA – If Disney Ran Your Security Department • William …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

Christine Peterson

RMA Presents BYOD Policies at RTP CFO Forum

Protus3 News, Security Program Development, Training

Chris Peterson and presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …