Category Archives: Uncategorized

Insider Threat Program Development Training Course February 23 – 25, 2016 – Annapolis, MD

Security First & Associates in cooperation with NCMS Chesapeake Bay -Chapter 26 has coordinated to have the Insider Threat Program Development Training Course delivered to Defense Industry and Commercial Enterprise security professionals at a steeply discounted rate. The Insider Threat Program Development Training Course, is taught by Insider Threat Defense. The training will be hosted…

CNN: Reports Russian spies in New York

Russian spies used tickets and hats to try to hide New York activities, FBI says; http://www.cnn.com/2015/01/27/us/new-york-alleged-russian-spy/index.html

Security Clearance used by Airline Worker to smuggled Guns on Airplane

Atlanta (CNN) — The breakup of a gun smuggling ring allegedly involving a current and former Delta Air Lines employee has exposed what a New York prosecutor described as an “egregious breach of security” at Hartsfield-Jackson Atlanta International Airport. Brooklyn District Attorney Kenneth Thompson said Tuesday that the investigation was “deeply troubling” — not only…

Have you registered for the Association of Certified Background Investigator’s Oct. 29 & 30 Conference, Leesburg, VA

ASSOCIATION OF CERTIFIED BACKGROUND INVESTIGATORS 2014 National Conference October 29-30, 2014   WHERE: The National Conference Center (NCC) 18980 Upper Belmont Place, Leesburg, VA 20176 Phone: (703) 729-8000, Fax: (703) 729-5382 NCC website: http://www.conferencecenter.com.   WHEN: Wednesday, October 29th to Thursday, October 30th, 2014.   COST: Overnight Guests – $219.00 plus tax, per person, per…

UCI – But it’s not classified!

  But it’s not classified, Ever Heard of Unclassified Controllable Information (UCI) ? There are over 100 ways of characterizing Sensitive but Unclassified (SBU) information, and even more opinions on how it should be protected, marked and disseminated. We all have experience with handling information that is SBU/FOUO/PII and any number of the other 100…

HOW EMPLOYEES GET AROUND IT SECURITY POLICIES AND RESTRICTIONS

Because of mobile devices, cloud services, mobile apps and mobile WiFi hotspots, employees can get around the most stringent IT security policies. Many companies have a mixture of personal and corporate-owned devices. Companies also have a mixture of IT policies that apply to each. Some businesses also have some kind of enterprise mobility management (EMM)…

Security Update on SOCIAL ENGINEERING

Did you know that Social engineering is the art of manipulating people so they give up confidential information? Criminals target individuals into giving them their passwords or bank information. They can also access your computer to secretly install malicious software which allows them access to your passwords and bank information as well as giving them…

Security First & Associates 2013 NCMS Security Society Award Winner

Press Release  Monday, July 1, 2013 Security First & Associates 410-381-8033   2013 NCMS Security Society Award Winner Announced  Columbia, MD – Locally owned Security First & Associates announced today that Diane Griffin, President/CEO/Consultant, has been named the 2013 National Classification Management Society (NCMS) Society Award Winner for her Valuable Contributions to the Security Society at…

Security Alert – Page missing from a passport led to a bomb at airport!

Page missing from a passport led to a bomb at airport! DETROIT — When a Saudi Arabian airline passenger arrived at Detroit Metropolitan Airport weeks ago, red flags went up, landing him in jail. He had a pressure cooker in his luggage — a similar device was used in the Boston Marathon bombings. He gave…

Electronic Fingerprint Mandate

Electronic Fingerprint Mandate As of December 13, 2013 all agencies have transitioned to electronic capture and submission of a full set of fingerprints in support of all background investigations. This requirement extends to contractors cleared under the National Industrial Security Program (NISP). With an only an estimated 11% of current NISP contracts using electronic submissions,…