The Cost-Saving Reasons for Conducting Background Checks

As more and more personal and professional information is available online (Hello, Facebook!), some companies are cutting corners by failing to do thorough background checks on all employees—even those part-time folks that have been hired for the summer.  While this may seem like a good way to save some corporate dollars, it could end up…

Insider Threat Program Development Training Course February 23 – 25, 2016 – Annapolis, MD

Security First & Associates in cooperation with NCMS Chesapeake Bay -Chapter 26 has coordinated to have the Insider Threat Program Development Training Course delivered to Defense Industry and Commercial Enterprise security professionals at a steeply discounted rate. The Insider Threat Program Development Training Course, is taught by Insider Threat Defense. The training will be hosted…

National Association of Professional Women Honors Diane Griffin President / CEO of Security First & Associates into its VIP Woman of the Year Circle

The National Association of Professional Women (NAPW) honors Diane Griffin President & CEO of Security First & Associates. as a 2015-2016 VIP Woman of the Year. Ms. Griffin is recognized with this prestigious distinction for leadership in business. NAPW is the nation’s leading networking organization exclusively for professional women, boasting 850,000 members and over 200…

October is CyberSafety Awareness Month

Be wary of “skimmers” on ATMs, gas station pumps, and other machines with credit card readers. Skimmers are small devices installed over the normal reading slot. The skimmer reads your credit or debit card’s information. The crook then returns later to remove the skimmer and retrieve the stored information. Skimming devices are not always noticeable,…

5 Ways to Strengthen Your Cyber Security

Security First & Associates states  that when National Journal former Justice Department official Mike DuBose said, “Amidst all the concern and discussion over foreign hacking, what gets lost is the fact that the vast majority of serious breaches involving trade secrets or other proprietary or classified information are still being committed by insiders.” As I’ve…

CNN: Reports Russian spies in New York

Russian spies used tickets and hats to try to hide New York activities, FBI says; http://www.cnn.com/2015/01/27/us/new-york-alleged-russian-spy/index.html

Security Clearance used by Airline Worker to smuggled Guns on Airplane

Atlanta (CNN) — The breakup of a gun smuggling ring allegedly involving a current and former Delta Air Lines employee has exposed what a New York prosecutor described as an “egregious breach of security” at Hartsfield-Jackson Atlanta International Airport. Brooklyn District Attorney Kenneth Thompson said Tuesday that the investigation was “deeply troubling” — not only…

Have you registered for the Association of Certified Background Investigator’s Oct. 29 & 30 Conference, Leesburg, VA

ASSOCIATION OF CERTIFIED BACKGROUND INVESTIGATORS 2014 National Conference October 29-30, 2014   WHERE: The National Conference Center (NCC) 18980 Upper Belmont Place, Leesburg, VA 20176 Phone: (703) 729-8000, Fax: (703) 729-5382 NCC website: http://www.conferencecenter.com.   WHEN: Wednesday, October 29th to Thursday, October 30th, 2014.   COST: Overnight Guests – $219.00 plus tax, per person, per…

UCI – But it’s not classified!

  But it’s not classified, Ever Heard of Unclassified Controllable Information (UCI) ? There are over 100 ways of characterizing Sensitive but Unclassified (SBU) information, and even more opinions on how it should be protected, marked and disseminated. We all have experience with handling information that is SBU/FOUO/PII and any number of the other 100…

HOW EMPLOYEES GET AROUND IT SECURITY POLICIES AND RESTRICTIONS

Because of mobile devices, cloud services, mobile apps and mobile WiFi hotspots, employees can get around the most stringent IT security policies. Many companies have a mixture of personal and corporate-owned devices. Companies also have a mixture of IT policies that apply to each. Some businesses also have some kind of enterprise mobility management (EMM)…