Category Archives: Uncategorized

New Executive Order Updates Security Clearance Process

New Executive Order Updates Security Clearance Process As President Barack Obama prepared to leave office on January 20th, he signed an executive order that updates the structure and process for issuing security clearances. According to Federal News Radio, the order more clearly outlines the Office of Personnel Management’s (OPM) responsibilities in this process including: Open…

New Change to Psychological Health Question on the SF-86

In November, the Director of National Intelligence James Clapper issued Revised Instructions for Completing Question 21, Standard Form 86, “Questionnaire for National Security Positions,” ES 2013-00242 in hopes of making it clear that “mental health treatment is not a detriment to holding or maintaining a security clearance.” Section 21 of the SF-86 has long been…

Insider Threat Monitoring Rules for Federal Contractors

Insider Threat Monitoring Rules for Federal Contractors Reminder that your must certify to DSS that your company has appointment an Insider Threat Program by Today – November 30, 2016.  All Federal contractors holding facility clearances face new insider threat monitoring rules that will require them to gather, integrate, and report relevant and available information indicative of…

Insider Threat Program Development Training Course February 23 – 25, 2016 – Annapolis, MD

Security First & Associates in cooperation with NCMS Chesapeake Bay -Chapter 26 has coordinated to have the Insider Threat Program Development Training Course delivered to Defense Industry and Commercial Enterprise security professionals at a steeply discounted rate. The Insider Threat Program Development Training Course, is taught by Insider Threat Defense. The training will be hosted…

CNN: Reports Russian spies in New York

Russian spies used tickets and hats to try to hide New York activities, FBI says; http://www.cnn.com/2015/01/27/us/new-york-alleged-russian-spy/index.html

Security Clearance used by Airline Worker to smuggled Guns on Airplane

Atlanta (CNN) — The breakup of a gun smuggling ring allegedly involving a current and former Delta Air Lines employee has exposed what a New York prosecutor described as an “egregious breach of security” at Hartsfield-Jackson Atlanta International Airport. Brooklyn District Attorney Kenneth Thompson said Tuesday that the investigation was “deeply troubling” — not only…

Have you registered for the Association of Certified Background Investigator’s Oct. 29 & 30 Conference, Leesburg, VA

ASSOCIATION OF CERTIFIED BACKGROUND INVESTIGATORS 2014 National Conference October 29-30, 2014   WHERE: The National Conference Center (NCC) 18980 Upper Belmont Place, Leesburg, VA 20176 Phone: (703) 729-8000, Fax: (703) 729-5382 NCC website: http://www.conferencecenter.com.   WHEN: Wednesday, October 29th to Thursday, October 30th, 2014.   COST: Overnight Guests – $219.00 plus tax, per person, per…

UCI – But it’s not classified!

  But it’s not classified, Ever Heard of Unclassified Controllable Information (UCI) ? There are over 100 ways of characterizing Sensitive but Unclassified (SBU) information, and even more opinions on how it should be protected, marked and disseminated. We all have experience with handling information that is SBU/FOUO/PII and any number of the other 100…

HOW EMPLOYEES GET AROUND IT SECURITY POLICIES AND RESTRICTIONS

Because of mobile devices, cloud services, mobile apps and mobile WiFi hotspots, employees can get around the most stringent IT security policies. Many companies have a mixture of personal and corporate-owned devices. Companies also have a mixture of IT policies that apply to each. Some businesses also have some kind of enterprise mobility management (EMM)…

Security Update on SOCIAL ENGINEERING

Did you know that Social engineering is the art of manipulating people so they give up confidential information? Criminals target individuals into giving them their passwords or bank information. They can also access your computer to secretly install malicious software which allows them access to your passwords and bank information as well as giving them…