Author Archives: Diane

New Executive Order Updates Security Clearance Process

New Executive Order Updates Security Clearance Process As President Barack Obama prepared to leave office on January 20th, he signed an executive order that updates the structure and process for issuing security clearances. According to Federal News Radio, the order more clearly outlines the Office of Personnel Management’s (OPM) responsibilities in this process including: Open…

New Change to Psychological Health Question on the SF-86

In November, the Director of National Intelligence James Clapper issued Revised Instructions for Completing Question 21, Standard Form 86, “Questionnaire for National Security Positions,” ES 2013-00242 in hopes of making it clear that “mental health treatment is not a detriment to holding or maintaining a security clearance.” Section 21 of the SF-86 has long been…

Insider Threat Monitoring Rules for Federal Contractors

Insider Threat Monitoring Rules for Federal Contractors Reminder that your must certify to DSS that your company has appointment an Insider Threat Program by Today – November 30, 2016.  All Federal contractors holding facility clearances face new insider threat monitoring rules that will require them to gather, integrate, and report relevant and available information indicative of…

Could Your Company Handle an Insider Threat?

If you’ve been following my writing, you know that I believe one of the biggest security threats a company may face is not from outside sources—it’s from their own employees (or former employees). Many companies think they are prepared to handle an insider threat, but are they? Here are the 5 things your company should…

Who’s In Charge of Keeping Your Company Secure?

Even if your company has strategies in place to handle malicious attacks on your security, you may still be at great risk for insider threats.  Why? According to a Forrester study, “insiders” were involved in 39 percent of data breaches—of that 39 percent, 27 percent came from inadvertent misuse of data by employees, making your…

The Threat of File Sharing

The Threat of File Sharing A surprising number of companies suspect their employees are using online file-sharing services to store and share company files. This is a dangerous situation. How dangerous? It really depends on how sensitive, regulated and critical the documents are. However, many of the companies are unaware that employees are even using…

The Cost-Saving Reasons for Conducting Background Checks

As more and more personal and professional information is available online (Hello, Facebook!), some companies are cutting corners by failing to do thorough background checks on all employees—even those part-time folks that have been hired for the summer.  While this may seem like a good way to save some corporate dollars, it could end up…

Insider Threat Program Development Training Course February 23 – 25, 2016 – Annapolis, MD

Security First & Associates in cooperation with NCMS Chesapeake Bay -Chapter 26 has coordinated to have the Insider Threat Program Development Training Course delivered to Defense Industry and Commercial Enterprise security professionals at a steeply discounted rate. The Insider Threat Program Development Training Course, is taught by Insider Threat Defense. The training will be hosted…

National Association of Professional Women Honors Diane Griffin President / CEO of Security First & Associates into its VIP Woman of the Year Circle

The National Association of Professional Women (NAPW) honors Diane Griffin President & CEO of Security First & Associates. as a 2015-2016 VIP Woman of the Year. Ms. Griffin is recognized with this prestigious distinction for leadership in business. NAPW is the nation’s leading networking organization exclusively for professional women, boasting 850,000 members and over 200…

October is CyberSafety Awareness Month

Be wary of “skimmers” on ATMs, gas station pumps, and other machines with credit card readers. Skimmers are small devices installed over the normal reading slot. The skimmer reads your credit or debit card’s information. The crook then returns later to remove the skimmer and retrieve the stored information. Skimming devices are not always noticeable,…